Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Linear-time 2-party secure merge from additively homomorphic encryption
Falk, Brett Hemenway, Nema, Rohit, Ostrovsky, Rafail
Published in Journal of computer and system sciences (01.11.2023)
Published in Journal of computer and system sciences (01.11.2023)
Get full text
Journal Article
EPDL: An efficient and privacy-preserving deep learning for crowdsensing
Xu, Chang, Jin, Guoxie, Zhu, Liehuang, Zhang, Chuan, Jia, Yu
Published in Peer-to-peer networking and applications (01.11.2022)
Published in Peer-to-peer networking and applications (01.11.2022)
Get full text
Journal Article
Verifiable Arithmetic Computations Using Additively Homomorphic Tags
Anisimov, Anatoly V., Novokshonov, Andrey
Published in 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) (01.12.2019)
Published in 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) (01.12.2019)
Get full text
Conference Proceeding
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption
Becher, Kilian, Strufe, Thorsten
Published in Proceedings - IEEE Symposium on Computers and Communications (01.07.2020)
Published in Proceedings - IEEE Symposium on Computers and Communications (01.07.2020)
Get full text
Conference Proceeding
A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things
Zhang, Mingwu, Yang, Mingxuan, Shen, Gang, Xia, Zhe, Wang, Yuntao
Published in Information sciences (01.04.2023)
Published in Information sciences (01.04.2023)
Get full text
Journal Article
Discrete logarithm based additively homomorphic encryption and secure data aggregation
Wang, Licheng, Wang, Lihua, Pan, Yun, Zhang, Zonghua, Yang, Yixian
Published in Information sciences (15.08.2011)
Published in Information sciences (15.08.2011)
Get full text
Journal Article
Privacy-Preserving Federated Deep Learning With Irregular Users
Xu, Guowen, Li, Hongwei, Zhang, Yun, Xu, Shengmin, Ning, Jianting, Deng, Robert H.
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Get full text
Journal Article
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data
Liu, Lin, Su, Jinshu, Liu, Ximeng, Chen, Rongmao, Huang, Kai, Deng, Robert H., Wang, Xiaofeng
Published in IEEE internet of things journal (01.12.2019)
Published in IEEE internet of things journal (01.12.2019)
Get full text
Journal Article
A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems
Chenglin Miao, Lu Su, Wenjun Jiang, Yaliang Li, Miaomiao Tian
Published in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (01.05.2017)
Published in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (01.05.2017)
Get full text
Conference Proceeding
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Devadas, Srinivas, van Dijk, Marten, Fletcher, Christopher W., Ren, Ling, Shi, Elaine, Wichs, Daniel
Published in Theory of Cryptography (01.01.2016)
Published in Theory of Cryptography (01.01.2016)
Get full text
Book Chapter
DivORAM: Towards a practical oblivious RAM with variable block size
Liu, Zheli, Huang, Yanyu, Li, Jin, Cheng, Xiaochun, Shen, Chao
Published in Information sciences (01.06.2018)
Published in Information sciences (01.06.2018)
Get full text
Journal Article
Cryptanalysis of an additively homomorphic public key encryption scheme
Hong, Zhiyong, Zhou, Liguo, Zhan, Yu, Liu, Chengdong, Wang, Baocang
Published in Computer standards and interfaces (01.08.2022)
Published in Computer standards and interfaces (01.08.2022)
Get full text
Journal Article
Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things
Liu, Lin, Su, Jinshu, Zhao, Baokang, Wang, Qiong, Chen, Jinrong, Luo, Yuchuan
Published in Symmetry (Basel) (01.01.2020)
Published in Symmetry (Basel) (01.01.2020)
Get full text
Journal Article
SOCT: Secure Outsourcing Computation Toolkit Using Threshold ElGamal Algorithm
Hu, Sen, Ci, Shang, Guan, Donghai, Koc, Cetin Kaya
Published in IEEE transactions on cloud computing (01.04.2025)
Published in IEEE transactions on cloud computing (01.04.2025)
Get full text
Journal Article
A Linear-Time 2-Party Secure Merge Protocol
Falk, Brett Hemenway, Nema, Rohit, Ostrovsky, Rafail
Published in Cyber Security, Cryptology, and Machine Learning (2022)
Published in Cyber Security, Cryptology, and Machine Learning (2022)
Get full text
Book Chapter
An Additively Homomorphic Encryption over Large Message Space
Chen, Hu, Hu, Yupu, Lian, Zhizhu, Jia, Huiwen, Wang, Xu An
Published in International journal of information technology and web engineering (01.07.2015)
Published in International journal of information technology and web engineering (01.07.2015)
Get full text
Journal Article