Homomorphic encryption for machine learning in medicine and bioinformatics

A Wood, K Najarian, D Kahrobaei - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …

TFHE: fast fully homomorphic encryption over the torus

I Chillotti, N Gama, M Georgieva, M Izabachène - Journal of Cryptology, 2020 - Springer
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …

Forty years of attacks on the RSA cryptosystem: A brief survey

M Mumtaz, L Ping - Journal of Discrete Mathematical Sciences and …, 2019 - Taylor & Francis
RSA public key cryptosystem is the de-facto standard use in worldwide technologies as a
strong encryption/decryption and digital signature scheme. RSA successfully defended forty …

Fully homomorphic encryption over the integers

M Van Dijk, C Gentry, S Halevi… - Advances in Cryptology …, 2010 - Springer
We construct a simple fully homomorphic encryption scheme, using only elementary
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …

A guide to fully homomorphic encryption

F Armknecht, C Boyd, C Carr, K Gjøsteen… - Cryptology ePrint …, 2015 - eprint.iacr.org
Fully homomorphic encryption (FHE) has been dubbed the holy grail of cryptography, an
elusive goal which could solve the IT world's problems of security and trust. Research in the …

[图书][B] An Introduction to Cryptography

J Hoffstein, J Pipher, JH Silverman, J Hoffstein… - 2014 - Springer
An Introduction to Cryptography | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover An …

Batch fully homomorphic encryption over the integers

JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint… - Advances in Cryptology …, 2013 - Springer
We extend the fully homomorphic encryption scheme over the integers of van Dijk et
al.(DGHV) into a batch fully homomorphic encryption scheme, ie to a scheme that supports …

[图书][B] Undergraduate Texts in Mathematics

S Axler, KA Ribet - 2015 - Springer
In Chapter 1, we have seen how the algebra of the polynomial rings k [x1,..., xn] and the
geometry of affine algebraic varieties are linked. In this chapter, we will study the method of …

Cryptanalysis of the multilinear map over the integers

JH Cheon, K Han, C Lee, H Ryu, D Stehlé - Advances in Cryptology …, 2015 - Springer
We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,
Lepoint and Tibouchi (CLT). The attack relies on an adaptation of the so-called zeroizing …

Toward secure multikeyword top-k retrieval over encrypted cloud data

J Yu, P Lu, Y Zhu, G Xue, M Li - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Cloud computing has emerging as a promising pattern for data outsourcing and high-quality
data services. However, concerns of sensitive information on cloud potentially causes …