[PDF][PDF] End-to-end data security for IoT: from a cloud of encryptions to encryption in the cloud

A Canteaut, S Carpov, C Fontaine, J Fournier… - Cesar …, 2017 - sirdeyre.free.fr
This paper surveys the symmetric primitives suitable for the unusually strong versatility
requirements of end-to-end encryption in the context of IoT. For example, on the objects …

Convolution-Friendly Image Compression in FHE

A Mertens, G Nicolas, S Rovira - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) is a powerful tool that brings privacy and
security to all sorts of applications by allowing us to perform additions and multiplications …

Towards video compression in the encrypted domain: A case-study on the h264 and hevc macroblock processing pipeline

D Nokam Kuate, S Canard, R Sirdey - International Conference on …, 2018 - Springer
Image/video compression is a widely used operation in our everyday life. Such an operation
usually proceeds independantly on small rectangular portions, so-called macroblocks, and …

Processing Encrypted Multimedia Data Using Homomorphic Encryption

S Canard, S Carpov, C Fontaine, R Sirdey - 2022 - ieeexplore.ieee.org
This chapter is concerned with encryption techniques in the cryptographic sense of the term,
that is, techniques designed to ensure the confidentiality of data in general, regardless of its …

JPEG decompression in the homomorphic encryption domain

X Ma, C Liu, S Cao, BB Zhu - Proceedings of the 26th ACM international …, 2018 - dl.acm.org
Privacy-preserving processing is desirable for cloud computing to relieve users' concern of
loss of control of their uploaded data. This may be fulfilled with homomorphic encryption …

[PDF][PDF] Evaluation of lossless algorithms for data compression

N Sharma, U Batrab - Top. Intell. Comput. Ind. Des., 2020 - academia.edu
Data compression is a procedure undertaken to convert the depicted data from one form to
another form post compression, which contains the same information but with the reduced …

[PDF][PDF] 通信量削減のための準同型暗号文の圧縮

泉湖雪, 松本茉倫, 小口**人 - マルチメディア, 分散, 協調とモバイル …, 2023 - is.ocha.ac.jp
準同型暗号は暗号文同士の加算や乗算が可能であり, データを秘匿したままで分析し活用可能な
技術の一つである. 準同型暗号の応用例としては暗号化データベースが挙げられる …

Computer-implemented method of performing format-preserving encryption of a data object of variable size

MS Boesgaard - US Patent 11,902,417, 2024 - Google Patents
A computer-implemented method of encrypting a data object of variable size utilizing an
inner encryption algorithm can take a variable size input and of outputting, as its output, an …

PAnTHErS: un outil d'aide pour l'analyse et l'exploration d'algorithmes de chiffrement homomorphe

C Feron - 2018 - theses.hal.science
Le chiffrement homomorphe est un système de cryptographie permettant la manipulation de
données chiffrées. Cette propriété offre à un utilisateur la possibilité de déléguer des …

Traiter des données multimédia chiffrées grâce au chiffrement homomorphe

S Canard, S Carpov, C Fontaine… - Sécurité multimédia 2 …, 2021 - books.google.com
Ce chapitre présente l'état d'avancement des techniques de chiffrement homomorphes, qui
permettent d'effectuer des traitements sur des données chiffrées. Ces techniques sont très …