搜索结果: 1-15 共查到“军事学 homomorphic”相关记录334条 . 查询时间(0.046 秒)
Randomly Rotate Qubits Compute and Reverse --- IT-Secure Non-Interactive Fully-Compact Homomorphic Quantum Computations over Classical Data Using Random Bases
Homomorphic encryption Quantum cryptography Information-theoretic security
2019/9/16
Homomorphic encryption (HE) schemes enable processing of encrypted data and may be used by a user to outsource storage and computations to an untrusted server. A plethora of HE schemes has been sugges...
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
Homomorphic encryption Automatic arithmetic circuit generation Lattice-based cryptography
2019/9/3
Homomorphic Encryption (HE) is an emerging technnology that enables computing on data while the data is encrypted. A major challenge with homomorphic encryption is that it takes extensive expert knowl...
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Fully Homomorphic Encryption Neural Networks LWE
2019/8/30
Securing Neural Network (NN) computations through the use of Fully Homomorphic Encryption (FHE) is the subject of a growing interest in both communities. Among different possible approaches to that to...
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
somewhat homomorphic encryption multiplicative depth Boolean functions
2019/8/27
In somewhat homomorphic encryption schemes (e.g. B/FV, BGV) the size of ciphertexts and the execution performance of homomorphic operations depends heavily on the multiplicative depth. The multiplicat...
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
distributed homomorphic cryptosystems threshold cryptography secure multiparty computation
2019/8/26
In this work, we advance the conceptual and technical aspects of Secure Multiparty Computation (SMC). We approach SMC as a computational problem and propose a novel formulation of this problem in term...
Homomorphic Encryption is a breakthrough technology which can enable private cloud storage and computation solutions, and many applications have been described in the literature in the last few years....
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Multi-key homomorphic signatures cryptographic pairings efficient software implementation
2019/7/18
We consider the problem of outsourcing computation on data authenticated by different users. Our aim is to describe and implement the simplest possible solution to provide data integrity in cloud-base...
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Applied Cryptography Decision Tree Homomorphic Encryption
2019/7/17
Decision tree and its generalization of random forests are a simple yet powerful machine learning model for many classification and regression problems. Recent works propose how to privately evaluate ...
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Location privacy Geohashing Spatial cloaking
2019/7/17
Location data is an important piece of contextual information in location-driven features for geosocial and pervasive computing applications. In this paper, we propose to geo-hash locations using spac...
Fully Homomorphic NIZK and NIWI Proofs
Non-interactive zero-knowledge (NIZK) Non-interactive witness-indistinguishability (NIWI) Homomorphism
2019/6/21
Our first result, under the Decision Linear Assumption (DLIN), is an FH-NIZK proof system for L in the common random string model. Our more surprising second result (under a new decisional assumption ...
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Fully-Homomorphic Encryption High-Rate Time-Lock Puzzles
2019/6/19
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-homomorphic encryption schemes to obtain constructions with new properties. Specifically, we present ...
Better Bootstrapping for Approximate Homomorphic Encryption
Homomorphic Encryption Bootstrapping Polynomial Approximation
2019/6/12
After Cheon et al. (Asiacrypt' 17) proposed approximate homomorphic encryption for operations between encrypted real (or complex) numbers, this scheme is widely used in various fields with the needs o...
On the Plausibility of Fully Homomorphic Encryption for RAMs
Fully Homomorphic Encryption Oblivious Ram Secret-Key Private Information Retrieval
2019/6/4
We initiate the study of fully homomorphic encryption for RAMs (RAM-FHE). This is a public-key encryption scheme where, given an encryption of a large database DD, anybody can efficiently compute an e...
Time-lock puzzles allow one to encrypt messages for the future, by efficiently generating a puzzle with a solution ss that remains hidden until time TT has elapsed. The solution is required to be conc...
Cryptanalysis of Ring Homomorphic Encryption Schemes
homomorphic encryption schemes quantum computing key-recovery attack
2019/6/3
We analyze the structure of finite commutative rings with respect to its idempotent and nilpotent elements. Based on this analysis we provide a quantum-classical IND-CCA^1 attack for ring homomorphic ...