A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

[HTML][HTML] Privacy-preserving neural networks with homomorphic encryption: C hallenges and opportunities

B Pulido-Gaytan, A Tchernykh… - Peer-to-Peer Networking …, 2021 - Springer
Classical machine learning modeling demands considerable computing power for internal
calculations and training with big data in a reasonable amount of time. In recent years …

[HTML][HTML] Security aspects of blockchain technology intended for industrial applications

SM Idrees, M Nowostawski, R Jameel, AK Mourya - Electronics, 2021 - mdpi.com
Blockchain technology plays a significant role in the industrial development. Many industries
can potentially benefit from the innovations blockchain decentralization technology and …

[HTML][HTML] An efficient approach based on privacy-preserving deep learning for satellite image classification

M Alkhelaiwi, W Boulila, J Ahmad, A Koubaa, M Driss - Remote Sensing, 2021 - mdpi.com
Satellite images have drawn increasing interest from a wide variety of users, including
business and government, ever since their increased usage in important fields ranging from …

Biometric authentication and image encryption for image security in cloud framework

V Kakkad, M Patel, M Shah - Multiscale and Multidisciplinary Modeling …, 2019 - Springer
Cloud computing is a major blooming technology which has numerous applications in
today's market and is rightly so hyped. Images are a major part of today's internet data traffic …

A systematic review on the status and progress of homomorphic encryption technologies

M Alloghani, MM Alani, D Al-Jumeily, T Baker… - Journal of Information …, 2019 - Elsevier
With the emergence of big data and the continued growth in cloud computing applications,
serious security and privacy concerns emerged. Consequently, several researchers and …

[HTML][HTML] A hybrid privacy-preserving deep learning approach for object classification in very high-resolution satellite images

W Boulila, MK Khlifi, A Ammar, A Koubaa, B Benjdira… - Remote Sensing, 2022 - mdpi.com
Deep learning (DL) has shown outstanding performances in many fields, including remote
sensing (RS). DL is turning into an essential tool for the RS research community. Recently …

A survey on implementations of homomorphic encryption schemes

TVT Doan, ML Messai, G Gavin, J Darmont - The Journal of …, 2023 - Springer
With the increased need for data confidentiality in various applications of our daily life,
homomorphic encryption (HE) has emerged as a promising cryptographic topic. HE enables …

[HTML][HTML] Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption

C Regueiro, I Seco, S De Diego, O Lage… - Information Processing & …, 2021 - Elsevier
The recent increase in reported incidents of security breaches compromising users' privacy
call into question the current centralized model in which third-parties collect and control …

Homomorphic encryption systems statement: Trends and challenges

B Alaya, L Laouamer, N Msilini - Computer Science Review, 2020 - Elsevier
For securing our own systems, encryption got the major interest, especially when talking
about homomorphic encryption, which has spread like wildfire. Therefore, in this study, we …