Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Leveraging searchable encryption through homomorphic encryption: A comprehensive analysis
I Amorim, I Costa - Mathematics, 2023 - mdpi.com
The widespread adoption of cloud infrastructures has revolutionized data storage and
access. However, it has also raised concerns regarding the privacy of sensitive data. To …
access. However, it has also raised concerns regarding the privacy of sensitive data. To …
Core-sets: Updated survey
D Feldman - Sampling techniques for supervised or unsupervised …, 2020 - Springer
In optimization or machine learning problems we are given a set of items, usually points in
some metric space, and the goal is to minimize or maximize an objective function over some …
some metric space, and the goal is to minimize or maximize an objective function over some …
Introduction to core-sets: an updated survey
D Feldman - arXiv preprint arXiv:2011.09384, 2020 - arxiv.org
In optimization or machine learning problems we are given a set of items, usually points in
some metric space, and the goal is to minimize or maximize an objective function over some …
some metric space, and the goal is to minimize or maximize an objective function over some …
Veritas: Plaintext encoders for practical verifiable homomorphic encryption
S Chatel, C Knabenhans, A Pyrgelis… - Proceedings of the …, 2024 - dl.acm.org
Homomorphic encryption has become a practical solution for protecting the privacy of
computations on sensitive data. However, existing homomorphic encryption pipelines do not …
computations on sensitive data. However, existing homomorphic encryption pipelines do not …
Obfuscated access and search patterns in searchable encryption
Searchable Symmetric Encryption (SSE) allows a data owner to securely outsource its
encrypted data to a cloud server while maintaining the ability to search over it and retrieve …
encrypted data to a cloud server while maintaining the ability to search over it and retrieve …
Optimisations and tradeoffs for helib
In this work, we investigate the BGV scheme as implemented in HElib. We begin by
performing an implementation-specific noise analysis of BGV. This allows us to derive much …
performing an implementation-specific noise analysis of BGV. This allows us to derive much …
Verifiable encodings for secure homomorphic analytics
S Chatel, C Knabenhans, A Pyrgelis… - arXiv preprint arXiv …, 2022 - arxiv.org
Homomorphic encryption, which enables the execution of arithmetic operations directly on
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …
Compressed oblivious encoding for homomorphically encrypted search
Fully homomorphic encryption (FHE) enables a simple, attractive framework for secure
search. Compared to other secure search systems, no costly setup procedure is necessary; …
search. Compared to other secure search systems, no costly setup procedure is necessary; …
Accurate range query with privacy preservation for outsourced location-based service in IOT
With the maturity of Internet-of-Things technology, location-based service (LBS) is
developing rapidly in intelligent terminal devices, and it brings new vitality to the fields of …
developing rapidly in intelligent terminal devices, and it brings new vitality to the fields of …