Journal articles on the topic 'Quantum Homomorphic Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Quantum Homomorphic Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hu, Yanglin, Yingkai Ouyang, and Marco Tomamichel. "Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption." Quantum 7 (April 13, 2023): 976. http://dx.doi.org/10.22331/q-2023-04-13-976.
Full textKuang, Randy, and Maria Perepechaenko. "A novel homomorphic polynomial public key encapsulation algorithm." F1000Research 12 (October 17, 2023): 1347. http://dx.doi.org/10.12688/f1000research.133031.1.
Full textBhoi, Siddhartha Siddhiprada, Arathi Arakala, Amy Beth Corman, and Asha Rao. "Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives." Cryptography 9, no. 2 (2025): 31. https://doi.org/10.3390/cryptography9020031.
Full textLai, Ching-Yi, and Kai-Min Chung. "On statistically-secure quantum homomorphic encryption." Quantum Information and Computation 18, no. 9&10 (2018): 785–94. http://dx.doi.org/10.26421/qic18.9-10-4.
Full textLiu, Wen, Yangzhi Li, Zhirao Wang, and Yugang Li. "A New Quantum Private Protocol for Set Intersection Cardinality Based on a Quantum Homomorphic Encryption Scheme for Toffoli Gate." Entropy 25, no. 3 (2023): 516. http://dx.doi.org/10.3390/e25030516.
Full textCai, Xiao-Qiu, Zi-Fan Liu, and Tian-yin Wang. "Measurement-device-independent quantum homomorphic encryption." Physics Letters A 513 (July 2024): 129609. http://dx.doi.org/10.1016/j.physleta.2024.129609.
Full textTang, Yongli, Menghao Guo, Binyong Li, Kaixin Geng, Jinxia Yu, and Baodong Qin. "Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks." Entropy 27, no. 1 (2024): 7. https://doi.org/10.3390/e27010007.
Full textWang, Yuqi, Kun She, Qingbin Luo, Fan Yang, and Chao Zhao. "Symmetric weak ternary quantum homomorphic encryption schemes." Modern Physics Letters B 30, no. 07 (2016): 1650076. http://dx.doi.org/10.1142/s0217984916500767.
Full textCh Jayanth Babu, Et al. "Construction of Communication Protocol Using Ring-LWE-Based Homomorphic Encryption in Iot-Cloud Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 2268–75. http://dx.doi.org/10.17762/ijritcc.v11i9.9232.
Full textZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, et al. "A Secure Multiparty Quantum Homomorphic Encryption Scheme." Computers, Materials & Continua 73, no. 2 (2022): 2835–48. http://dx.doi.org/10.32604/cmc.2022.029125.
Full textDhahir, Zainab Sahib. "Quantum-Resistant Homomorphic Encryption for IoT Security (QRHE)." Al-Salam Journal for Engineering and Technology 4, no. 1 (2024): 36–51. http://dx.doi.org/10.55145/ajest.2025.04.01.004.
Full textNewman, Michael, and Yaoyun Shi. "Limitations on transversal computation through quantum homomorphic encryption." Quantum Information and Computation 18, no. 11&12 (2018): 927–48. http://dx.doi.org/10.26421/qic18.11-12-3.
Full textSamuel Omokhafe Yusuf, Amarachi Zita Echere, Godbless Ocran, Justina Eweala Abubakar, Adedamola Hadassah Paul-Adeleye, and Peprah Owusu. "Analyzing the efficiency of AI-powered encryption solutions in safeguarding financial data for SMBs." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 2138–47. http://dx.doi.org/10.30574/wjarr.2024.23.3.2753.
Full textMa, Guangsheng, and Hongbo Li. "Quantum Fully Homomorphic Encryption by Integrating Pauli One-time Pad with Quaternions." Quantum 6 (December 1, 2022): 866. http://dx.doi.org/10.22331/q-2022-12-01-866.
Full textSamuel, Omokhafe Yusuf, Zita Echere Amarachi, Ocran Godbless, Eweala Abubakar Justina, Hadassah Paul-Adeleye Adedamola, and Owusu Peprah. "Analyzing the efficiency of AI-powered encryption solutions in safeguarding financial data for SMBs." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 2138–47. https://doi.org/10.5281/zenodo.14964050.
Full textJiang, Yongbo, Yuan Zhou, and Tao Feng. "A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption." Information 13, no. 10 (2022): 481. http://dx.doi.org/10.3390/info13100481.
Full textJohn, Michael, Ogoegbulem Ozioma, Perpetua Ngozi Obi, Henry Etaroghene Egbogho, and Otobong. G. Udoaka. "Lattices in Quantum-ERA Cryptography." International Journal of Research Publication and Reviews, V 4, no. 11 (2023): 2175–79. https://doi.org/10.5281/zenodo.10207210.
Full textLiang, Min. "Symmetric quantum fully homomorphic encryption with perfect security." Quantum Information Processing 12, no. 12 (2013): 3675–87. http://dx.doi.org/10.1007/s11128-013-0626-5.
Full textSun, Xiaoqiang, Ting Wang, Zhiwei Sun, Ping Wang, Jianping Yu, and Weixin Xie. "An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption." International Journal of Theoretical Physics 56, no. 4 (2017): 1335–45. http://dx.doi.org/10.1007/s10773-017-3275-0.
Full textXu, Gang, Fan Yun, Xiu-Bo Chen, et al. "Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption." Intelligent Automation & Soft Computing 34, no. 1 (2022): 531–41. http://dx.doi.org/10.32604/iasc.2022.028264.
Full textLiang, Min. "Quantum fully homomorphic encryption scheme based on universal quantum circuit." Quantum Information Processing 14, no. 8 (2015): 2749–59. http://dx.doi.org/10.1007/s11128-015-1034-9.
Full textAkhanova, Dinara. "MODERN DATA ENCRYPTION METHODS: FROM AES TO QUANTUM CRYPTOGRAPHY." Батыс Қазақстан инновациялық-технологиялық университетінің Хабаршысы 33, no. 1 (2025): 238–44. https://doi.org/10.62724/202510307.
Full textWang, Ziwei, Ruwei Huang, and Xiyi Wei. "A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts." Applied Sciences 15, no. 1 (2025): 473. https://doi.org/10.3390/app15010473.
Full textZhang, Xuejian, Yan Chang, Lin Zeng, Weifeng Xue, Lili Yan, and Shibin Zhang. "Universal and holistic privacy protection in quantum computing: a novel approach through quantum circuit equivalence homomorphic encryption." Quantum Science and Technology 9, no. 4 (2024): 045043. http://dx.doi.org/10.1088/2058-9565/ad749a.
Full textLizama-Pérez, Luis Adrián. "A Matrix Multiplication Approach to Quantum-Safe Cryptographic Systems." Cryptography 8, no. 4 (2024): 56. https://doi.org/10.3390/cryptography8040056.
Full textLee, Jaehyeok, Phap Ngoc Duong, and Hanho Lee. "Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption." Sensors 23, no. 17 (2023): 7389. http://dx.doi.org/10.3390/s23177389.
Full textChang, Wen, Zhen-Zhen Li, Fu-Cheng You, and Xing-Bo Pan. "Dynamic quantum fully homomorphic encryption scheme based on universal quantum circuit." Journal of Information Security and Applications 75 (June 2023): 103510. http://dx.doi.org/10.1016/j.jisa.2023.103510.
Full textMukherjee, Anisha, Aikata Aikata, Ahmet Can Mert, et al. "ModHE: Modular Homomorphic Encryption Using Module Lattices." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (2023): 527–62. http://dx.doi.org/10.46586/tches.v2024.i1.527-562.
Full textManap, Abusaid, Gulnar Abitova, Gulzhan Uskenbayeva, and Aigul Shaikhanova. "DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW." Вестник КазАТК 129, no. 6 (2023): 205–15. http://dx.doi.org/10.52167/1609-1817-2023-129-6-205-215.
Full textArjona, Rosario, Paula López-González, Roberto Román, and Iluminada Baturone. "Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece." Applied Sciences 13, no. 2 (2023): 757. http://dx.doi.org/10.3390/app13020757.
Full textRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.
Full textRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.
Full textDr. I. Carol. "Advancing Data Security in Cloud Computing: A Comprehensive Exploration of Quantum-Secure Variant of Fully Homomorphic Encryption Technique." Cuestiones de Fisioterapia 54, no. 3 (2025): 2825–44. https://doi.org/10.48047/whx0v680.
Full textTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu, and Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function." Security and Communication Networks 2021 (February 12, 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Full textWeinreich, Jan, Guido Falk von Rudorff, and O. Anatole von Lilienfeld. "Encrypted machine learning of molecular quantum properties." Machine Learning: Science and Technology 4, no. 2 (2023): 025017. http://dx.doi.org/10.1088/2632-2153/acc928.
Full textLiu, Yuan, Yun Pan, Lize Gu, Yuan Zhang, and Dezhi An. "Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext." Mathematical Problems in Engineering 2021 (February 2, 2021): 1–10. http://dx.doi.org/10.1155/2021/6656764.
Full textSohn, Il Kwon, Jonghyun Lee, Wonhyuk Lee, Woojin Seok, and Jun Heo. "Quantum Error Correction Code Scheme used for Homomorphic Encryption like Quantum Computation." Jouranl of Information and Security 19, no. 3 (2019): 61–70. http://dx.doi.org/10.33778/kcsa.2019.19.3.061.
Full textChen, Geng, Yuqi Wang, Liya Jian, et al. "Quantum identity authentication protocol based on flexible quantum homomorphic encryption with qubit rotation." Journal of Applied Physics 133, no. 6 (2023): 064402. http://dx.doi.org/10.1063/5.0135896.
Full textGbadebo, Michael Olayinka. "Integrating Post-Quantum Cryptography and Advanced Encryption Standards to Safeguard Sensitive Financial Records from Emerging Cyber Threats." Asian Journal of Research in Computer Science 18, no. 4 (2025): 1–23. https://doi.org/10.9734/ajrcos/2025/v18i4605.
Full textKara, Mostefa, Konstantinos Karampidis, Giorgos Papadourakis, Mohammad Hammoudeh, and Muath AlShaikh. "An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method." J 7, no. 4 (2024): 406–20. http://dx.doi.org/10.3390/j7040024.
Full textCheng, Zhen-Wen, Xiu-Bo Chen, Gang Xu, Yan Chang, Yu Yang, and Yi-Xian Yang. "A secure crossing two qubits protocol based on quantum homomorphic encryption." Quantum Science and Technology 7, no. 2 (2022): 025027. http://dx.doi.org/10.1088/2058-9565/ac5acc.
Full textSachin Gupta. "Advanced Encryption Techniques for Database Security in Cloud Environments." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 5 (2024): 611–21. http://dx.doi.org/10.32628/cseit241051048.
Full textYe, Chong-Qiang, Jian Li, and Xiao-Yu Chen. "Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments." Sensors 24, no. 22 (2024): 7405. http://dx.doi.org/10.3390/s24227405.
Full textZhu, Hongfeng, Liwei Wang, and Chaonan Wang. "Privacy-Enhanced Multi-User Quantum Private Data Query Using Partial Quantum Homomorphic Encryption." International Journal of Theoretical Physics 60, no. 6 (2021): 2090–101. http://dx.doi.org/10.1007/s10773-021-04827-8.
Full textZhu, Hongfeng, Chaonan Wang, and Xueying Wang. "Quantum Fully Homomorphic Encryption Scheme for Cloud Privacy Data Based on Quantum Circuit." International Journal of Theoretical Physics 60, no. 8 (2021): 2961–75. http://dx.doi.org/10.1007/s10773-021-04879-w.
Full textZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Full textHuang, Hongzhi. "Research on the Application of Data Encryption Technology in Computer Network Communication Security." Applied Science and Innovative Research 8, no. 2 (2024): p80. http://dx.doi.org/10.22158/asir.v8n2p80.
Full textUçar, Eren Danyel. "Post-Quantum Cryptography: Designing Secure Cryptographic Systems to Withstand the Threat of Quantum Computing Attacks." Human Computer Interaction 8, no. 1 (2024): 65. http://dx.doi.org/10.62802/53c7az87.
Full textZhao, Dikai. "Advances and Applications in Fully Homomorphic Encryption Research." Applied and Computational Engineering 135, no. 1 (2025): 39–48. https://doi.org/10.54254/2755-2721/2025.20959.
Full textLiu, Jiang, Qin Li, Junyu Quan, Can Wang, Jinjing Shi, and Haozhen Situ. "Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation." Designs, Codes and Cryptography 90, no. 3 (2022): 577–91. http://dx.doi.org/10.1007/s10623-021-00993-2.
Full text