Efficiently Processing Complex-Valued Data in Homomorphic Encryption
نویسندگان
چکیده
منابع مشابه
Processing Encrypted Data Using Homomorphic Encryption
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work. First a scheme is constructed which can ev...
متن کاملComplex-Valued Data Envelopment Analysis
Data Envelopment Analysis (DEA) is a nonparametric approach for measuring the relative efficiency of a decision making units consists of multiple inputs and outputs. In all standard DEA models semi positive real valued measures are assumed, while in some real cases inputs and outputs may take complex valued. The question is related to measuring efficiency in such cases. As far as we are aware, ...
متن کاملGenerating Customer Relationship Management Efficiently Using Homomorphic Encryption
Due to the enormous increase in image database size as well as its vast deployment in various applications the need of Customer Relationship Management becomes a crucial part of today’s cutting edge technology. Online recommender systems are the ones that enable personalized service to users. The underlying techniques operate on privacy sensitive user data and these could be misused by the serv...
متن کاملSecure Signal Processing Using Fully Homomorphic Encryption
This paper investigates the problem of performing signal processing via remote execution methods while maintaining the privacy of the data. Primary focus on this problem is a situation where there are two parties; a client with data or a signal that needs to be processed and a server with computational resources. Revealing the signal unencrypted causes a violation of privacy for the client. One...
متن کاملSecuring Data in Cloud Using Homomorphic Encryption
Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Mathematical Cryptology
سال: 2020
ISSN: 1862-2984,1862-2976
DOI: 10.1515/jmc-2015-0051