Secure matrix multiplication based on fully homomorphic encryption
H Huang, H Zong - The Journal of Supercomputing, 2023 - Springer
Fully homomorphic encryption allows to perform arbitrary computation over encrypted data
which has great practical implications in the secure outsourced computation on an untrusted …
which has great practical implications in the secure outsourced computation on an untrusted …
Improved privacy-preserving PCA using optimized homomorphic matrix multiplication
Abstract Principal Component Analysis (PCA) is a pivotal technique widely utilized in the
realms of machine learning and data analysis. It aims to reduce the dimensionality of a …
realms of machine learning and data analysis. It aims to reduce the dimensionality of a …
Fast secure matrix multiplications over ring-based homomorphic encryption
As widespread development of biometrics, concerns about security and privacy are rapidly
increasing. Secure matrix computation is one of the most fundamental and useful operations …
increasing. Secure matrix computation is one of the most fundamental and useful operations …
Communication-efficient secure logistic regression
We present a novel construction that enables two parties to securely train a logistic
regression model on private secret-shared data. Our goal is to minimize online …
regression model on private secret-shared data. Our goal is to minimize online …
Principal component analysis using CKKS homomorphic scheme
S Panda - Cyber Security Cryptography and Machine Learning …, 2021 - Springer
Principal component analysis (PCA) is one of the most popular linear dimensionality
reduction techniques in machine learning. In this paper, we try to present a method for …
reduction techniques in machine learning. In this paper, we try to present a method for …
Secure outsourced computation of multiple matrix multiplication based on fully homomorphic encryption
S Wang, H Huang - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
Fully homomorphic encryption allows a third-party to perform arbitrary computation over
encrypted data and is especially suitable for secure outsourced computation. This paper …
encrypted data and is especially suitable for secure outsourced computation. This paper …
Secure outsourced computation of matrix determinant based on fully homomorphic encryption
H Zong, H Huang, S Wang - IEEE Access, 2021 - ieeexplore.ieee.org
Fully homomorphic encryption enables to perform arbitrary computation over encrypted
data, providing a powerful tool for secure outsourced computation on an untrusted …
data, providing a powerful tool for secure outsourced computation on an untrusted …
Secure and efficient general matrix multiplication on cloud using homomorphic encryption
Despite the enormous technical and financial advantages of cloud computing, security and
privacy have always been the primary concerns for adopting cloud computing facilities …
privacy have always been the primary concerns for adopting cloud computing facilities …
Principal component analysis using ckks homomorphic encryption scheme
S Panda - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Principal component analysis (PCA) is one of the most pop-ular linear dimensionality
reduction techniques in machine learning. Inthis paper, we try to present a method for …
reduction techniques in machine learning. Inthis paper, we try to present a method for …
A New Framework for Fast Homomorphic Matrix Multiplication
X Zheng, H Li, D Wang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Homomorphic Encryption (HE) is one of the mainstream cryptographic tools used to enable
secure outsourced computation. A typical task is secure matrix computation. Popular HE …
secure outsourced computation. A typical task is secure matrix computation. Popular HE …