A systematic review of homomorphic encryption and its contributions in healthcare industry

K Munjal, R Bhatia - Complex & Intelligent Systems, 2023 - Springer
Cloud computing and cloud storage have contributed to a big shift in data processing and its
use. Availability and accessibility of resources with the reduction of substantial work is one of …

Precision health data: Requirements, challenges and existing techniques for data security and privacy

C Thapa, S Camtepe - Computers in biology and medicine, 2021 - Elsevier
Precision health leverages information from various sources, including omics, lifestyle,
environment, social media, medical records, and medical insurance claims to enable …

A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

Efficient Fully Homomorphic Encryption from (Standard)

Z Brakerski, V Vaikuntanathan - SIAM Journal on computing, 2014 - SIAM
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of
a message, m, into an encryption of any (efficient) function of that message, f(m), without …

(Leveled) fully homomorphic encryption without bootstrap**

Z Brakerski, C Gentry, V Vaikuntanathan - ACM Transactions on …, 2014 - dl.acm.org
We present a novel approach to fully homomorphic encryption (FHE) that dramatically
improves performance and bases security on weaker assumptions. A central conceptual …

Function secret sharing

E Boyle, N Gilboa, Y Ishai - Annual international conference on the theory …, 2015 - Springer
Motivated by the goal of securely searching and updating distributed data, we introduce and
study the notion of function secret sharing (FSS). This new notion is a natural generalization …

Privacy-preserving neural networks with homomorphic encryption: C hallenges and opportunities

B Pulido-Gaytan, A Tchernykh… - Peer-to-Peer Networking …, 2021 - Springer
Classical machine learning modeling demands considerable computing power for internal
calculations and training with big data in a reasonable amount of time. In recent years …

Fully homomorphic encryption using ideal lattices

C Gentry - Proceedings of the forty-first annual ACM symposium …, 2009 - dl.acm.org
We propose a fully homomorphic encryption scheme--ie, a scheme that allows one to
evaluate circuits over encrypted data without being able to decrypt. Our solution comes in …

[BOG][B] A fully homomorphic encryption scheme

C Gentry - 2009 - search.proquest.com
We propose the first fully homomorphic encryption scheme, solving an old open problem.
Such a scheme allows one to compute arbitrary functions over encrypted data without the …

Fully homomorphic encryption over the integers

M Van Dijk, C Gentry, S Halevi… - Advances in Cryptology …, 2010 - Springer
We construct a simple fully homomorphic encryption scheme, using only elementary
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …