Preserving privacy in speaker and speech characterisation
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
Secure outsourced matrix computation and application to neural networks
Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and
security issues in outsourcing computation on sensitive data to an untrusted computation …
security issues in outsourcing computation on sensitive data to an untrusted computation …
Smart and practical privacy-preserving data aggregation for fog-based smart grids
With the increasingly powerful and extensive deployment of edge devices, edge/fog
computing enables customers to manage and analyze data locally, and extends computing …
computing enables customers to manage and analyze data locally, and extends computing …
Towards secure big data analysis via fully homomorphic encryption algorithms
Privacy-preserving techniques allow private information to be used without compromising
privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) …
privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) …
Privacy-preserving iris authentication using fully homomorphic encryption
Rapid advancement in technology has led to the use of biometric authentication in every
field. In particular, from the past few years, iris recognition systems has gained …
field. In particular, from the past few years, iris recognition systems has gained …
Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …
such as child sexual abuse material and extremist content. The predominant approach at …
Efficiency analysis of post-quantum-secure face template protection schemes based on homomorphic encryption
J Kolberg, P Drozdowski… - … Conference of the …, 2020 - ieeexplore.ieee.org
Since biometric characteristics are not revocable and biometric data is sensitive, privacy-
preserving methods are essential to operate a biometric recognition system. More precisely …
preserving methods are essential to operate a biometric recognition system. More precisely …
Fpga-based hardware accelerator for leveled ring-lwe fully homomorphic encryption
Y Su, B Yang, C Yang, L Tian - IEEE Access, 2020 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and
has great potential in privacy-preserving cloud computing and securely outsource …
has great potential in privacy-preserving cloud computing and securely outsource …
BMIAE: blockchain‐based multi‐instance iris authentication using additive ElGamal homomorphic encryption
Multi‐biometric systems have been widely accepted in various applications due to its
capability to solve the limitations of unimodal systems. Directly storing the biometric …
capability to solve the limitations of unimodal systems. Directly storing the biometric …
Template protection based on homomorphic encryption: Computationally efficient application to iris-biometric verification and identification
When employing biometric recognition systems, we have to take into account that biometric
data are considered sensitive data. This has raised some privacy issues, and therefore …
data are considered sensitive data. This has raised some privacy issues, and therefore …