From accuracy to approximation: A survey on approximate homomorphic encryption and its applications
W Liu, L You, Y Shao, X Shen, G Hu, J Shi… - Computer Science …, 2025 - Elsevier
Due to the increasing popularity of application scenarios such as cloud computing, and the
growing concern of users about the security and privacy of their data, information security …
growing concern of users about the security and privacy of their data, information security …
High-speed modular multiplier for lattice-based cryptosystems
Thanks to the inherent post-quantum resistant properties, lattice-based cryptography has
gained increasing attention in various cryptographic applications recently. To facilitate the …
gained increasing attention in various cryptographic applications recently. To facilitate the …
An ultra-highly parallel polynomial multiplier for the bootstrapping algorithm in a fully homomorphic encryption scheme
Fully homomorphic encryption (FHE) is a post-quantum secure cryptographic technology
that enables privacy-preserving computing on an untrusted platform without divulging any …
that enables privacy-preserving computing on an untrusted platform without divulging any …
Privacy-Preserving Discretized Spiking Neural Networks
The rapid development of artificial intelligence has brought considerable convenience, yet
also introduces significant security risks. One of the research hotspots is to balance data …
also introduces significant security risks. One of the research hotspots is to balance data …
Overflow-Detectable Floating-Point Fully Homomorphic Encryption
A floating-point fully homomorphic encryption (FPFHE) is proposed, which is based on torus
fully homomorphic encryption equipped with programmable bootstrapping. Specifically …
fully homomorphic encryption equipped with programmable bootstrapping. Specifically …
Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption
Recent speech-based services such as voice assistants and cloud computing services have
brought security concerns, since those services constantly send user's speech data to the …
brought security concerns, since those services constantly send user's speech data to the …
Microservices architectural based secure and failure aware task assignment schemes in fog‐cloud assisted Internet of things
C Wu, A Lakhan, TM Gronali - International Journal of …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) paradigm has applications in many domains and is
growing these days progressively. The applications are e‐business, e‐healthcare, and e …
growing these days progressively. The applications are e‐business, e‐healthcare, and e …
Efficient Privacy-Preserving Convolutional Spiking Neural Networks with FHE
With the rapid development of AI technology, we have witnessed numerous innovations and
conveniences. However, along with these advancements come privacy threats and risks …
conveniences. However, along with these advancements come privacy threats and risks …
Quantum Fast Implementation of Functional Bootstrapping and Private Information Retrieval
G Ma, H Li - arXiv preprint arXiv:2409.20182, 2024 - arxiv.org
Classical privacy-preserving computation techniques safeguard sensitive data in cloud
computing, but often suffer from low computational efficiency. In this paper, we show that …
computing, but often suffer from low computational efficiency. In this paper, we show that …
Privacy Preserving Discretized Spiking Neural Network with TFHE
Artificial intelligence not only offers significant convenience but also raises privacy and
security concerns, which pose challenges for Spiking Neural Networks (SNNs). Fully …
security concerns, which pose challenges for Spiking Neural Networks (SNNs). Fully …