Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On CCA-Secure Somewhat Homomorphic Encryption

It is well known that any encryption scheme which supports any form of homomorphic operation cannot be secure against adaptive chosen ciphertext attacks. The question then arises as to what is the most stringent security definition which is achievable by homomorphic encryption schemes. Prior work has shown that various schemes which support a single homomorphic encryption scheme can be shown to...

متن کامل

On Statistically-Secure Quantum Homomorphic Encryption

Homomorphic encryption is an encryption scheme that allows computations to be evaluated on encrypted inputs without knowledge of their raw messages. Recently Ouyang et al. constructed a quantum homomorphic encryption (QHE) scheme for Clifford circuits with statistical security (or information-theoretic security (IT-security)). It is desired to see whether an informationtheoretically-secure (ITS...

متن کامل

FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption

BACKGROUND The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. ...

متن کامل

A Secure Internet Voting Protocol Based on Homomorphic Encryption

In this paper, we focus on Internet voting protocol. Our protocol is similar to the Norwegian scheme which has been used in local elections in 2011. The primary focus of this paper is to prevent a possible cooperation between Ballot Box and Receipt Generator in the Norwegian scheme. The other purpose of this research is to present the alternative solution of coercion which is one of the most im...

متن کامل

Threshold Fully Homomorphic Encryption and Secure Computation

Cramer, Damgård, and Nielsen [CDN01] show how to construct an efficient secure multiparty computation scheme using a threshold homomorphic encryption scheme that has four properties i) a honest-verifier zero-knowledge proof of knowledge of encrypted values, ii) proving multiplications correct iii) threshold decryption and iv) trusted shared key setup. Naor and Nissim [NN01a] show how to constru...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JMIR Medical Informatics

سال: 2018

ISSN: 2291-9694

DOI: 10.2196/medinform.8805