نتایج جستجو برای: such as homomorphic deconvolution

تعداد نتایج: 5967123  

2008
Rafail Ostrovsky William E. Skeith

In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption schemes, using their homomorphic properties in a black-box way. A few notable examples of such primitives include items like single database Private Information Retrieval (PIR) schemes (introduced in [15]) and private da...

Journal: :IACR Cryptology ePrint Archive 2013
Jung Hee Cheon Jinsu Kim

We introduce a hybrid homomorphic encryption by combining public key encryption (PKE) and somewhat homomorphic encryption (SHE) to reduce storage for most applications of somewhat or fully homomorphic encryption (FHE). In this model, one encrypts messages with a PKE and computes on encrypted data using a SHE or a FHE after homomorphic decryption. To obtain efficient homomorphic decryption, our ...

Journal: :فیزیک زمین و فضا 0
یوسف محمدی دانش آموخته کارشناسی ارشد ژئوفیزیک، دانشگاه تحصیلات تکمیلی صنعتی کرمان، ایران حمیدرضا سیاه کوهی استاد، گروه فیزیک زمین، مؤسسه ژئوفیزیک دانشگاه تهران، ایران

spectral decomposition or time-frequency representation (tfr) is a powerful tool for analyzing time varying nature of seismic data. mapping of a one dimensional seismic time trace to a two dimensional function of time and frequency reveals some characteristics of seismic signals that are not available in only time or frequency representations. this approach has been widely used in seismic explo...

In this work, we introduce $H^*$-condition on the set of submodules of a module. Let $M$ be a module. We say $M$ satisfies $H^*$ provided that for every submodule $N$ of $M$, there is a direct summand$D$ of $M$ such that $(N+D)/N$ and $(N+D)/D$ are cosingular. We show that over a right perfect right $GV$-ring,a homomorphic image of a $H^*$ duo module satisfies $H^*$.

1983
John A. Barnden

The formal expression of pro positional attitudes, especially when nested (iterated), is an important problem for A I . An interesting first-order extensional logical system for such expression has been proposed by Creary. In this system concepts (and concepts of concepts, etc.) are made explicit. The system includes "concept functions", which are special functions which act on and deliver conc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده کشاورزی 1394

with the increasing population and the need for more food, as well as with the development of science and technology, human approach to unnatural and often chemical inputs to increase agricultural production has been a great expansion and problems such as increased cancers, chronic diseases has created environmental pollution. implementation of organic organic is a solution to these problems . ...

Journal: :CoRR 2013
Stefan Rass

Secure function evaluation (SFE) is the process of computing a function (or running an algorithm) on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsou...

Journal: :Journal of applied physiology 2004
Franklin Sedarat Eric Lin Edwin D W Moore Glen F Tibbits

Colocalization of dihydropyridine (DHPR) and ryanodine (RyR) receptors, a key determinant of Ca(2+)-induced Ca2+ release, was previously estimated in 3-, 6-, 10-, and 20-day-old rabbit ventricular myocytes by immunocytochemistry and confocal microscopy. We now report on the effects of deconvolution (using a maximum-likelihood estimation algorithm) on the calculation of colocalization indexes. C...

2015
Mayank Varia Sophia Yakoubov Yang Yang

In this work, we present a generic open-source software framework that can evaluate the correctness and performance of homomorphic encryption software. Our framework, called HEtest, automates the entire process of a test: generation of data for testing (such as circuits and inputs), execution of a test, comparison of performance to an insecure baseline, statistical analysis of the test results,...

Journal: :IACR Cryptology ePrint Archive 2013
Wei Zhang Shuguang Liu Xiaoyuan Yang

Basing on Learning with errors over rings (RLWE) assumption, we provide a new multi-bit somewhat homomorphic encryption scheme. We introduce canonical embedding to transform a ring element into a vector, such that polynomial multiplication can be performed in  ~ (nlog n) scalar operations, and ciphertext size is reduced at the same time. The CPA security of this scheme can be reduced into RLWE...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید