Essays about: "Homomorphic Encryption Schemes"

Showing result 1 - 5 of 8 essays containing the words Homomorphic Encryption Schemes.

  1. 1. XZDDF Bootstrapping in Fully Homomorphic Encryption

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Simon Ljungbeck; [2024]
    Keywords : Fully Homomorphic Encryption; Homomorphic Encryption; Bootstrapping; Blind Rotation; XZDDF; Technology and Engineering;

    Abstract : Despite the vast research on the topic in recent years, fully homomorphic encryption schemes remain time-inefficient. The main bottleneck is the so-called bootstrapping, whose purpose is to reduce noise that has accumulated after having performed homomorphic operations on a ciphertext. READ MORE

  2. 2. Homomorphic encryption

    University essay from KTH/Matematik (Avd.)

    Author : Daniel Sanaee; [2023]
    Keywords : Mathematics; Cryptography; Computer science; Group Theory; Matematik; Kryptografi; Datalogi; Gruppteori;

    Abstract : The problem of constructing a secure encryption scheme that allows for computation on encrypted data was an open problem for more than 30 years. In 2009, Craig Gentry solved the problem, constructing the first fully homomorphic encryption (FHE) scheme. READ MORE

  3. 3. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  4. 4. Evaluating performance of homomorphic encryption applied on delta encoding

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : János Richard Dani; [2022]
    Keywords : homomorphic encryption; delta encoding; performance test;

    Abstract : Homomorphic encryption is an encryption scheme that allows for simple operations on encrypted data. These operations are mainly boolean circuits combined into more complexarithmetic operations, rotations, and others. Homomorphic encryption was first implemented in 2009, and in the following decade, many different versions emerged. READ MORE

  5. 5. Homomorphic Encryption for Audio Conferencing

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Herman Nordin; Ebba Lindström; [2022]
    Keywords : Homomorphic encryption; VoIP; security; audio conferencing; cryptography;

    Abstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE