Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Leveraging searchable encryption through homomorphic encryption: A comprehensive analysis

I Amorim, I Costa - Mathematics, 2023 - mdpi.com
The widespread adoption of cloud infrastructures has revolutionized data storage and
access. However, it has also raised concerns regarding the privacy of sensitive data. To …

Core-sets: Updated survey

D Feldman - Sampling techniques for supervised or unsupervised …, 2020 - Springer
In optimization or machine learning problems we are given a set of items, usually points in
some metric space, and the goal is to minimize or maximize an objective function over some …

Introduction to core-sets: an updated survey

D Feldman - arXiv preprint arXiv:2011.09384, 2020 - arxiv.org
In optimization or machine learning problems we are given a set of items, usually points in
some metric space, and the goal is to minimize or maximize an objective function over some …

Veritas: Plaintext encoders for practical verifiable homomorphic encryption

S Chatel, C Knabenhans, A Pyrgelis… - Proceedings of the …, 2024 - dl.acm.org
Homomorphic encryption has become a practical solution for protecting the privacy of
computations on sensitive data. However, existing homomorphic encryption pipelines do not …

Obfuscated access and search patterns in searchable encryption

Z Shang, S Oya, A Peter, F Kerschbaum - arXiv preprint arXiv:2102.09651, 2021 - arxiv.org
Searchable Symmetric Encryption (SSE) allows a data owner to securely outsource its
encrypted data to a cloud server while maintaining the ability to search over it and retrieve …

Optimisations and tradeoffs for helib

A Costache, L Nürnberger, R Player - Cryptographers' Track at the RSA …, 2023 - Springer
In this work, we investigate the BGV scheme as implemented in HElib. We begin by
performing an implementation-specific noise analysis of BGV. This allows us to derive much …

Verifiable encodings for secure homomorphic analytics

S Chatel, C Knabenhans, A Pyrgelis… - arXiv preprint arXiv …, 2022 - arxiv.org
Homomorphic encryption, which enables the execution of arithmetic operations directly on
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …

Compressed oblivious encoding for homomorphically encrypted search

SG Choi, D Dachman-Soled, SD Gordon, L Liu… - Proceedings of the …, 2021 - dl.acm.org
Fully homomorphic encryption (FHE) enables a simple, attractive framework for secure
search. Compared to other secure search systems, no costly setup procedure is necessary; …

Accurate range query with privacy preservation for outsourced location-based service in IOT

Z Liu, L Wu, W Meng, H Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the maturity of Internet-of-Things technology, location-based service (LBS) is
developing rapidly in intelligent terminal devices, and it brings new vitality to the fields of …