Secure matrix multiplication based on fully homomorphic encryption

H Huang, H Zong - The Journal of Supercomputing, 2023 - Springer
Fully homomorphic encryption allows to perform arbitrary computation over encrypted data
which has great practical implications in the secure outsourced computation on an untrusted …

Improved privacy-preserving PCA using optimized homomorphic matrix multiplication

X Ma, C Ma, Y Jiang, C Ge - Computers & Security, 2024 - Elsevier
Abstract Principal Component Analysis (PCA) is a pivotal technique widely utilized in the
realms of machine learning and data analysis. It aims to reduce the dimensionality of a …

Fast secure matrix multiplications over ring-based homomorphic encryption

PK Mishra, D Rathee, DH Duong… - … Security Journal: A …, 2021 - Taylor & Francis
As widespread development of biometrics, concerns about security and privacy are rapidly
increasing. Secure matrix computation is one of the most fundamental and useful operations …

Communication-efficient secure logistic regression

A Agarwal, S Peceny, M Raykova… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
We present a novel construction that enables two parties to securely train a logistic
regression model on private secret-shared data. Our goal is to minimize online …

Principal component analysis using CKKS homomorphic scheme

S Panda - Cyber Security Cryptography and Machine Learning …, 2021 - Springer
Principal component analysis (PCA) is one of the most popular linear dimensionality
reduction techniques in machine learning. In this paper, we try to present a method for …

Secure outsourced computation of multiple matrix multiplication based on fully homomorphic encryption

S Wang, H Huang - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
Fully homomorphic encryption allows a third-party to perform arbitrary computation over
encrypted data and is especially suitable for secure outsourced computation. This paper …

Secure outsourced computation of matrix determinant based on fully homomorphic encryption

H Zong, H Huang, S Wang - IEEE Access, 2021 - ieeexplore.ieee.org
Fully homomorphic encryption enables to perform arbitrary computation over encrypted
data, providing a powerful tool for secure outsourced computation on an untrusted …

Secure and efficient general matrix multiplication on cloud using homomorphic encryption

Y Gao, G Quan, S Homsi, W Wen, L Wang - The Journal of …, 2024 - Springer
Despite the enormous technical and financial advantages of cloud computing, security and
privacy have always been the primary concerns for adopting cloud computing facilities …

Principal component analysis using ckks homomorphic encryption scheme

S Panda - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Principal component analysis (PCA) is one of the most pop-ular linear dimensionality
reduction techniques in machine learning. Inthis paper, we try to present a method for …

A New Framework for Fast Homomorphic Matrix Multiplication

X Zheng, H Li, D Wang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Homomorphic Encryption (HE) is one of the mainstream cryptographic tools used to enable
secure outsourced computation. A typical task is secure matrix computation. Popular HE …