Configurable encryption and decryption architectures for CKKS-based homomorphic encryption
With the increasing number of edge devices connecting to the cloud for storage and
analysis, concerns about security and data privacy have become more prominent …
analysis, concerns about security and data privacy have become more prominent …
Integer Modular Multiplication with Barrett Reduction and Its Variants for Homomorphic Encryption Applications: A Comprehensive Review and An Empirical Study
Modular arithmetic calculations, such as modular addition and multiplication, are
fundamental building blocks to Post-Quantum Cryptography (PQC) and Homomorphic …
fundamental building blocks to Post-Quantum Cryptography (PQC) and Homomorphic …
Low-Complexity and High-Throughput Number Theoretic Transform Architecture for Polynomial Multiplication in Homomorphic Encryption
The computationally intensive of polynomial ring multiplication in homomorphic encryption
(HE) schemes demand an optimized hardware accelerator design, specifically targeted for …
(HE) schemes demand an optimized hardware accelerator design, specifically targeted for …
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data
The suggested solution in this work makes use of the parallel processing capability of FPGA
to enhance the efficiency of the K-Nearest Neighbor (KNN) algorithm on encrypted data. The …
to enhance the efficiency of the K-Nearest Neighbor (KNN) algorithm on encrypted data. The …
GS-MDC: High-Speed and Area-Efficient Number Theoretic Transform Design
Y Geng, X Hu, Z Wang - … on Circuits and Systems II: Express …, 2024 - ieeexplore.ieee.org
Homomorphic encryption (HE) has recently become a promising approach to guarantee the
privacy security in cloud computing. Number theoretic transform (NTT) can be used to …
privacy security in cloud computing. Number theoretic transform (NTT) can be used to …
Advancing Privacy and Accuracy with Federated Learning and Homomorphic Encryption
T Nguyen - Authorea Preprints, 2023 - techrxiv.org
In this paper, we present an integrated framework that combines Federated Learning (FL)
with Homomorphic Encryption (HE) using the Artificial Intelligence (AI) models and the …
with Homomorphic Encryption (HE) using the Artificial Intelligence (AI) models and the …
Lightweight Privacy Architecture for Homomorphic Operations in e-Health Systems
In recent years, traditional hospital facilities are adopting new technologies that provide
novel services. Nevertheless, these services may be performed by third parties, that pose a …
novel services. Nevertheless, these services may be performed by third parties, that pose a …
Secure Federated Learning Scheme Based on Differential Privacy and Homomorphic Encryption
X Zhang, D Huang, Y Tang - International Conference on Intelligent …, 2024 - Springer
The development of AI technology has led to an increase in the amount and variety of data.
Deep neural networks (DNNs) are commonly used in computer vision, speech recognition …
Deep neural networks (DNNs) are commonly used in computer vision, speech recognition …