Kernel homomorphic encryption protocol

S Ullah, XY Li, MT Hussain, Z Lan - Journal of Information Security and …, 2019 - Elsevier
… In our proposed ker-HE scheme kernel function and kernel homomorphism are used to … we
apply functions (like kernel function and kernel homomorphism) to provide the efficient size of …

Homomorphic encryption on GPU

AŞ Özcan, C Ayduman, ER Türkoğlu, E Savaş - IEEE Access, 2023 - ieeexplore.ieee.org
… GPU kernels, … kernel is implemented using the conventional method as in many other works
in the literature, we propose a novel algorithm for the implementation of the first GPU kernel (…

Exploring the feasibility of fully homomorphic encryption

W Wang, Y Hu, L Chen, X Huang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
… a homomorphic encryption scheme refers to an encryption … ciphertexts without the knowledge
of the encryption key: . If the … The operation of the first kernel is similar to the first kernel in …

Openfhe: Open-source fully homomorphic encryption library

A Al Badawi, J Bates, F Bergamaschi… - … & applied homomorphic …, 2022 - dl.acm.org
Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables
performing computations over encrypted data without having access to the secret key. We …

An examination of multi-key fully homomorphic encryption and its applications

M Yuan, D Wang, F Zhang, S Wang, S Ji, Y Ren - Mathematics, 2022 - mdpi.com
… For example, there are already many applications of homomorphic encryption in the IoT
combined with cloud computing. Users store the encrypted data in the cloud, and the decryption …

Adaptive Autonomous Protocol for Secured Remote Healthcare Using Fully Homomorphic Encryption (AutoPro-RHC)

RK Sheu, YC Lin, MS Pardeshi, CY Huang, KC Pai… - Sensors, 2023 - mdpi.com
… The design for this work consists of an autonomous protocol, hospital servers combining
multiple prime/local hospitals, and an algorithm based on fast fully homomorphic encryption

Private pathological assessment via machine learning and homomorphic encryption

A Al Badawi, M Faizal Bin Yusof - BioData Mining, 2024 - Springer
kernels, providing a broader spectrum of kernel-based learning tasks using homomorphic
encryption… FHSVM’s strengths in efficiently handling linear and polynomial kernels are retained…

Porcupine: A synthesizing compiler for vectorized homomorphic encryption

M Cowan, D Dangwal, A Alaghi, C Trippel… - Proceedings of the …, 2021 - dl.acm.org
… We evaluate Porcupine using a set of kernels and show speedups of up to 52% (25% …
procedure that automates and optimizes the mapping and scheduling of plaintext kernels to HE …

[PDF][PDF] Secure storage of lung brain multi-modal medical images using DNA homomorphic encryption

SG Sophia, KK Thanammal, SS Sujatha - International Journal of …, 2023 - kitspress.com
… a novel kernel homomorphic encryption technique … kernel HE method. The Ker-HE strategy
was utilized to reduce the quantity of sounds by employing kernel and kernel homomorphism. …

Speed-up of Data Analysis with Kernel Trick in Encrypted Domain

JS Yoo, BK Song, TM Ahn, JW Heo… - arXiv preprint arXiv …, 2024 - arxiv.org
… Thus many practical algorithms bypass bootstrapping and instead use leveled homomorphic
encryption, or LHE—the depth of the circuit is pre-determined; it uses just enough …