Homomorphic encryption for machine learning in medicine and bioinformatics
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
A survey on fully homomorphic encryption: An engineering perspective
It is unlikely that a hacker is able to compromise sensitive data that is stored in an encrypted
form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to …
form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to …
Craterlake: a hardware accelerator for efficient unbounded computation on encrypted data
Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers
with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due …
with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due …
F1: A fast and programmable accelerator for fully homomorphic encryption
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …
A framework for secure and decentralized sharing of medical imaging data via blockchain consensus
V Patel - Health informatics journal, 2019 - journals.sagepub.com
The electronic sharing of medical imaging data is an important element of modern
healthcare systems, but current infrastructure for cross-site image transfer depends on trust …
healthcare systems, but current infrastructure for cross-site image transfer depends on trust …
Attacks Against the IND-CPAD Security of Exact FHE Schemes
A recent security model for fully homomorphic encryption (FHE), called IND-CPAD security
and introduced by Li and Micciancio [Eurocrypt'21], strengthens IND-CPA security by giving …
and introduced by Li and Micciancio [Eurocrypt'21], strengthens IND-CPA security by giving …
HEAX: An architecture for computing on encrypted data
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …
confidentiality also have been increased significantly. Not only cloud providers are …
A resource-efficient encryption algorithm for multimedia big data
S Aljawarneh, MB Yassein, WA Talafha - Multimedia Tools and …, 2017 - Springer
Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in
the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT …
the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT …
FPT: A fixed-point accelerator for torus fully homomorphic encryption
Fully Homomorphic Encryption (FHE) is a technique that allows computation on encrypted
data. It has the potential to drastically change privacy considerations in the cloud, but high …
data. It has the potential to drastically change privacy considerations in the cloud, but high …
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …