Journal articles on the topic 'Fully homomorphic encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Fully homomorphic encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rohilla, Alisha, Mehak Khurana, and Meena Kumari. "Homomorphic Cryptosystem." International Journal of Computer Network and Information Security 9, no. 5 (May 8, 2017): 44–51. http://dx.doi.org/10.5815/ijcnis.2017.05.06.
Full textBai, Shuangjie, Geng Yang, Jingqi Shi, Guoxiu Liu, and Zhaoe Min. "Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme." Security and Communication Networks 2018 (July 24, 2018): 1–14. http://dx.doi.org/10.1155/2018/2363928.
Full textJarwal, Abhimanyu, Kamlesh Kumar, and Ajay Kumar. "Secure Data Encryption Scheme for Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 897–902. http://dx.doi.org/10.22214/ijraset.2023.51058.
Full textErlanovna, Temirbekova Zhanerke, Tynymbayev Sakhybay, Abdiakhmetova Zukhra Muratovna, and Turken Gulzat. "Development Paillier's library of fully homomorphic encryption." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 3 (June 1, 2024): 1989. http://dx.doi.org/10.11591/ijeecs.v34.i3.pp1989-1998.
Full textZhu, Zong-Wu, and Ru-Wei Huang. "Efficient SMC Protocol Based on Multi-Bit Fully Homomorphic Encryption." Applied Sciences 11, no. 21 (November 3, 2021): 10332. http://dx.doi.org/10.3390/app112110332.
Full textPrasad, S. V. Suriya, and K. Kumanan. "Homomorphic Encryption Using Enhanced BGV Encryption Scheme For Cloud Security." International Journal Of Engineering And Computer Science 7, no. 03 (March 26, 2018): 23785–89. http://dx.doi.org/10.18535/ijecs/v7i3.22.
Full textHamza, Rafik, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, and Adil Yousif. "Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms." Entropy 24, no. 4 (April 6, 2022): 519. http://dx.doi.org/10.3390/e24040519.
Full textKim, Jeongsu, and Aaram Yun. "Secure Fully Homomorphic Authenticated Encryption." IEEE Access 9 (2021): 107279–97. http://dx.doi.org/10.1109/access.2021.3100852.
Full textIchibane, Yacine, Youssef Gahi, Mouhcine Guennoun, and Zouhair Guennoun. "Fully Homomorphic Encryption Without Noise." International Journal of Smart Security Technologies 6, no. 2 (July 2019): 33–51. http://dx.doi.org/10.4018/ijsst.2019070102.
Full textNavlani, Avinash, and Pallavi P. "Improvised Version: Fully Homomorphic Encryption." International Journal of Computer Applications 141, no. 10 (May 17, 2016): 32–36. http://dx.doi.org/10.5120/ijca2016909826.
Full textMa, Chunguang, Juyan Li, and Gang Du. "A Flexible Fully Homomorphic Encryption." Wireless Personal Communications 95, no. 2 (October 4, 2016): 761–72. http://dx.doi.org/10.1007/s11277-016-3796-5.
Full textEl-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (July 2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Full textEL-YAHYAOUI, Ahmed, and Mohamed Dafir ECH-CHERIF EL KETTANI. "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security." Technologies 7, no. 1 (February 6, 2019): 21. http://dx.doi.org/10.3390/technologies7010021.
Full textLiu, Jingting. "Fully homomorphic encryption in PPMLAn review." Applied and Computational Engineering 69, no. 1 (July 25, 2024): 129–35. http://dx.doi.org/10.54254/2755-2721/69/20241477.
Full textQu, Quanbo, Baocang Wang, Yuan Ping, and Zhili Zhang. "Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme." Security and Communication Networks 2019 (June 2, 2019): 1–6. http://dx.doi.org/10.1155/2019/8319508.
Full textPan, Jingshan, Tongtong Sui, Wen Liu, Jizhi Wang, Lingrui Kong, Yue Zhao, and Zhiqiang Wei. "Secure Control of Linear Controllers Using Fully Homomorphic Encryption." Applied Sciences 13, no. 24 (December 7, 2023): 13071. http://dx.doi.org/10.3390/app132413071.
Full textHu, Sen, Zhengquan Zhang, and Kevin (Xiaokang) Mo. "Homomorphic Encryption and its Application to Blockchain." Frontiers in Computing and Intelligent Systems 3, no. 1 (March 22, 2023): 110–12. http://dx.doi.org/10.54097/fcis.v3i1.6343.
Full textMahmood, Zainab H., and Mahmood K. Ibrahem. "HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV." Iraqi Journal of Information & Communications Technology 2, no. 2 (November 1, 2019): 44–57. http://dx.doi.org/10.31987/ijict.2.2.69.
Full textHuang, Jie, and Dehua Wu. "Cloud Storage Model Based on the BGV Fully Homomorphic Encryption in the Blockchain Environment." Security and Communication Networks 2022 (July 20, 2022): 1–9. http://dx.doi.org/10.1155/2022/8541313.
Full textShen, Jiachen, Yekang Zhao, Shitao Huang, and Yongjun Ren. "Secure and Flexible Privacy-Preserving Federated Learning Based on Multi-Key Fully Homomorphic Encryption." Electronics 13, no. 22 (November 14, 2024): 4478. http://dx.doi.org/10.3390/electronics13224478.
Full textLuo, Fucai, Fuqun Wang, Kunpeng Wang, Jie Li, and Kefei Chen. "LWR-Based Fully Homomorphic Encryption, Revisited." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/5967635.
Full textDeviani, Rini. "The Application of Fully Homomorphic Encryption on XGBoost Based Multiclass Classification." Journal of Information Engineering and Educational Technology 7, no. 1 (June 30, 2023): 49–58. http://dx.doi.org/10.26740/jieet.v7n1.p49-58.
Full textCreeger, Mache. "The Rise of Fully Homomorphic Encryption." Queue 20, no. 4 (August 31, 2022): 39–60. http://dx.doi.org/10.1145/3561800.
Full textJeong, Myoung In. "Technical Trend of Fully Homomorphic Encryption." Journal of the Korea Contents Association 13, no. 8 (August 31, 2013): 36–43. http://dx.doi.org/10.5392/jkca.2013.13.08.036.
Full textHabri, Hakim, Abdelhakim Chillali, and Abdelkarim Boua. "KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION." JP Journal of Algebra, Number Theory and Applications 54 (February 2, 2022): 35–50. http://dx.doi.org/10.17654/0972555522014.
Full textLópez-Alt, Adriana, Eran Tromer, and Vinod Vaikuntanathan. "Multikey Fully Homomorphic Encryption and Applications." SIAM Journal on Computing 46, no. 6 (January 2017): 1827–92. http://dx.doi.org/10.1137/14100124x.
Full textShokurov, A. V., and K. V. Sergeev. "On Constructing a Fully Homomorphic Encryption." Proceedings of the Institute for System Programming of RAS 23 (2012): 427–32. http://dx.doi.org/10.15514/ispras-2012-23-25.
Full textWu, David J. "Fully Homomorphic Encryption: Cryptography's holy grail." XRDS: Crossroads, The ACM Magazine for Students 21, no. 3 (March 27, 2015): 24–29. http://dx.doi.org/10.1145/2730906.
Full textBrakerski, Zvika, Craig Gentry, and Vinod Vaikuntanathan. "(Leveled) Fully Homomorphic Encryption without Bootstrapping." ACM Transactions on Computation Theory 6, no. 3 (July 2014): 1–36. http://dx.doi.org/10.1145/2633600.
Full textMartins, Paulo, Leonel Sousa, and Artur Mariano. "A Survey on Fully Homomorphic Encryption." ACM Computing Surveys 50, no. 6 (January 12, 2018): 1–33. http://dx.doi.org/10.1145/3124441.
Full textM, Yogasini, and Prathibha B N. "SECURE ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATA USING FULLY HOMOMORPHIC ENCRYPTION." ICTACT Journal on Soft Computing 11, no. 4 (July 1, 2021): 2424–28. http://dx.doi.org/10.21917/ijsc.2021.0345.
Full textZhao, Xiufeng, and Ailan Wang. "Generalized Bootstrapping Technique Based on Block Equality Test Algorithm." Security and Communication Networks 2018 (December 24, 2018): 1–8. http://dx.doi.org/10.1155/2018/9325082.
Full textSabnis, Prof Shweta, and Prof Pavan Mitragotri. "The Next Frontier of Security: Homomorphic Encryption in Action." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 158–70. http://dx.doi.org/10.22214/ijraset.2024.57921.
Full textHamad, Sarah Shihab, and Ali Makki Sagheer. "Fully Homomorphic Encryption based on Euler’s Theorem." Journal of Information Security Research 9, no. 3 (September 1, 2018): 83. http://dx.doi.org/10.6025/jisr/2018/9/3/83-95.
Full textKim, Jae-Heon, Sang-Kyung Yoo, and Sang-Han Lee. "Fully Homomorphic Encryption Scheme without Key Switching." Journal of Korea Information and Communications Society 38C, no. 5 (May 31, 2013): 428–33. http://dx.doi.org/10.7840/kics.2013.38c.5.428.
Full textPlantard, Thomas, Willy Susilo, and Zhenfei Zhang. "Fully Homomorphic Encryption Using Hidden Ideal Lattice." IEEE Transactions on Information Forensics and Security 8, no. 12 (December 2013): 2127–37. http://dx.doi.org/10.1109/tifs.2013.2287732.
Full textJo, Eun-Ji, Su-Bin Moon, and Younho Lee. "Performance Analysis of Fully Homomorphic Encryption Libraries." Journal of Korean Institute of Information Technology 16, no. 2 (February 28, 2018): 131–43. http://dx.doi.org/10.14801/jkiit.2018.16.2.131.
Full textShortell, Thomas, and Ali Shokoufandeh. "Secure signal processing using fully homomorphic encryption." IET Information Security 14, no. 1 (January 1, 2020): 51–59. http://dx.doi.org/10.1049/iet-ifs.2019.0157.
Full textWang, Wei, Yin Hu, Lianmu Chen, Xinming Huang, and Berk Sunar. "Exploring the Feasibility of Fully Homomorphic Encryption." IEEE Transactions on Computers 64, no. 3 (March 2015): 698–706. http://dx.doi.org/10.1109/tc.2013.154.
Full textBeunardeau, Marc, Aisling Connolly, Remi Geraud, and David Naccache. "Fully Homomorphic Encryption: Computations with a Blindfold." IEEE Security & Privacy 14, no. 1 (January 2016): 63–67. http://dx.doi.org/10.1109/msp.2016.8.
Full textHariss, Khalil, Hassan Noura, and Abed Ellatif Samhat. "An efficient fully homomorphic symmetric encryption algorithm." Multimedia Tools and Applications 79, no. 17-18 (January 11, 2020): 12139–64. http://dx.doi.org/10.1007/s11042-019-08511-2.
Full text张, 兴兰. "Attribute-Based Fully Homomorphic Encryption Based LWR." Computer Science and Application 08, no. 04 (2018): 503–11. http://dx.doi.org/10.12677/csa.2018.84056.
Full textLee, Hyunjun, Jina Choi, and Younho Lee. "Approximating Max Function in Fully Homomorphic Encryption." Electronics 12, no. 7 (April 4, 2023): 1724. http://dx.doi.org/10.3390/electronics12071724.
Full textGorantala, Shruthi, Rob Springer, and Bryant Gipson. "Unlocking the Potential of Fully Homomorphic Encryption." Communications of the ACM 66, no. 5 (April 21, 2023): 72–81. http://dx.doi.org/10.1145/3572832.
Full textLee, Seunghwan, and Dong-Joon Shin. "Overflow-Detectable Floating-Point Fully Homomorphic Encryption." IEEE Access 12 (2024): 6160–80. http://dx.doi.org/10.1109/access.2024.3351738.
Full textWan, Xiaohan, Hao Lin, Mingqiang Wang, and Wenting Shen. "Hierarchical Threshold Multi-Key Fully Homomorphic Encryption." Journal of Information Security and Applications 89 (March 2025): 103919. https://doi.org/10.1016/j.jisa.2024.103919.
Full textZhou, Shenglong. "Progress and Applications of Fully Homomorphic Encryption." Transactions on Computer Science and Intelligent Systems Research 6 (October 17, 2024): 55–63. http://dx.doi.org/10.62051/qbjp2h16.
Full textWang, Ziwei, Ruwei Huang, and Xiyi Wei. "A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts." Applied Sciences 15, no. 1 (January 6, 2025): 473. https://doi.org/10.3390/app15010473.
Full textChen, Yuyue, Ruwei Huang, and Bo Yang. "Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE." Applied Sciences 12, no. 17 (August 23, 2022): 8420. http://dx.doi.org/10.3390/app12178420.
Full textG., Chethana, and Padmaja K. V. "A novel secure biomedical data aggregation using fully homomorphic encryption in WSN." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 1 (October 1, 2021): 428. http://dx.doi.org/10.11591/ijeecs.v24.i1.pp428-443.
Full text