A systematic review of homomorphic encryption and its contributions in healthcare industry
K Munjal, R Bhatia - Complex & Intelligent Systems, 2023 - Springer
Cloud computing and cloud storage have contributed to a big shift in data processing and its
use. Availability and accessibility of resources with the reduction of substantial work is one of …
use. Availability and accessibility of resources with the reduction of substantial work is one of …
A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …
Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs
Contact tracing is an essential tool for public health officials and local communities to fight
the spread of novel diseases, such as for the COVID-19 pandemic. The Singaporean …
the spread of novel diseases, such as for the COVID-19 pandemic. The Singaporean …
Privacy‐preserving federated learning based on multi‐key homomorphic encryption
With the advance of machine learning and the Internet of Things (IoT), security and privacy
have become critical concerns in mobile services and networks. Transferring data to a …
have become critical concerns in mobile services and networks. Transferring data to a …
Secure single-server aggregation with (poly) logarithmic overhead
Secure aggregation is a cryptographic primitive that enables a server to learn the sum of the
vector inputs of many clients. Bonawitz et al.(CCS 2017) presented a construction that incurs …
vector inputs of many clients. Bonawitz et al.(CCS 2017) presented a construction that incurs …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
Privacy and security issues in deep learning: A survey
Deep Learning (DL) algorithms based on artificial neural networks have achieved
remarkable success and are being extensively applied in a variety of application domains …
remarkable success and are being extensively applied in a variety of application domains …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT
Due to the strong analytical ability of big data, deep learning has been widely applied to
model on the collected data in industrial Internet of Things (IoT). However, for privacy issues …
model on the collected data in industrial Internet of Things (IoT). However, for privacy issues …
Homomorphic encryption for arithmetic of approximate numbers
We suggest a method to construct a homomorphic encryption scheme for approximate
arithmetic. It supports an approximate addition and multiplication of encrypted messages …
arithmetic. It supports an approximate addition and multiplication of encrypted messages …