Skip to Content

107 Results Found

  • Article
  • Open Access
2 Citations
1,537 Views
15 Pages

11 May 2025

Homomorphic encryption is an important means for cloud computing to ensure information security when outsourcing data. Among them, threshold fully homomorphic encryption (ThFHE) is a key enabler for homomorphic encryption and, from a wider perspectiv...

  • Article
  • Open Access
1,332 Views
26 Pages

3 December 2025

Homomorphic encryption enables computations to be performed directly on encrypted data, ensuring data confidentiality even in untrusted or distributed environments. Although this approach provides strong theoretical security, its practical adoption r...

  • Article
  • Open Access
4 Citations
2,849 Views
15 Pages

Secure Control of Linear Controllers Using Fully Homomorphic Encryption

  • Jingshan Pan,
  • Tongtong Sui,
  • Wen Liu,
  • Jizhi Wang,
  • Lingrui Kong,
  • Yue Zhao and
  • Zhiqiang Wei

7 December 2023

In actual operation, there are security risks to the data of the network control system, mainly in the form of possible eavesdropping of signals in the transmission channel and parameters in the controller leading to data leakage. In this paper, we p...

  • Article
  • Open Access
5 Citations
2,382 Views
11 Pages

3 November 2021

Aiming at the problems of large ciphertext size and low efficiency in the current secure multi-party computation (SMC) protocol based on fully homomorphic encryption (FHE), the paper proves that the fully homomorphic encryption scheme that supports m...

  • Article
  • Open Access
24 Citations
12,874 Views
15 Pages

A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security

  • Ahmed EL-YAHYAOUI and
  • Mohamed Dafir ECH-CHERIF EL KETTANI

Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive d...

  • Article
  • Open Access
4 Citations
3,391 Views
15 Pages

23 August 2022

Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage. The fully homomorphic encryption approach has problems with excessive noise and the e...

  • Article
  • Open Access
14 Citations
5,250 Views
20 Pages

An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications

  • Minghao Yuan,
  • Dongdong Wang,
  • Feng Zhang,
  • Shenqing Wang,
  • Shan Ji and
  • Yongjun Ren

9 December 2022

With the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Il...

  • Article
  • Open Access
1,290 Views
18 Pages

We propose a new framework for compile-time ciphertext synthesis in fully homomorphic encryption (FHE) systems. Instead of invoking encryption algorithms at runtime, our method synthesizes ciphertexts from precomputed encrypted basis vectors using on...

  • Article
  • Open Access
1 Citations
1,531 Views
22 Pages

6 January 2025

The lattice-based multi-identity fully homomorphic encryption scheme combines the quantum security of lattice cryptography with the advantage of identity-based encryption. However, existing schemes face challenges such as large key sizes, inefficient...

  • Article
  • Open Access
2 Citations
3,607 Views
21 Pages

5 March 2025

With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. Consequently, homomorphic encryption, being a primary technique for achieving privacy computing, is held in high regard. Nevertheless, the...

  • Article
  • Open Access
9 Citations
6,581 Views
23 Pages

14 November 2024

Federated learning avoids centralizing data in a central server by distributing the model training process across devices, thus protecting privacy to some extent. However, existing research shows that model updates (e.g., gradients or weights) exchan...

  • Article
  • Open Access
12 Citations
6,628 Views
17 Pages

9 May 2023

The increasing ubiquity of big data and cloud-based computing has led to increased concerns regarding the privacy and security of user data. In response, fully homomorphic encryption (FHE) was developed to address this issue by enabling arbitrary com...

  • Article
  • Open Access
922 Views
18 Pages

16 October 2025

This paper investigates whether ChatGPT, a large language model, can assist in the implementation of lattice-based cryptography and fully homomorphic encryption algorithms, specifically the Ring Learning-with-Errors encryption scheme and the Brakersk...

  • Feature Paper
  • Article
  • Open Access
1,000 Views
16 Pages

27 November 2025

Fully Homomorphic Encryption (FHE) enables privacy-preserving computation but is hindered by high computational overhead, with the key-switching operation being a primary performance bottleneck. This paper introduces the first CUDA-optimized GPU impl...

  • Article
  • Open Access
3 Citations
3,693 Views
25 Pages

To address the issues of high single-point failure risk, weak privacy protection, and poor resistance to poisoning attacks in edge federated learning, an edge federated learning privacy protection scheme based on blockchain and fully homomorphic encr...

  • Article
  • Open Access
5 Citations
3,460 Views
17 Pages

24 February 2024

With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client’s privat...

  • Article
  • Open Access
1,877 Views
30 Pages

24 April 2025

Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results...

  • Article
  • Open Access
1 Citations
2,002 Views
22 Pages

21 May 2025

Multi-Key Fully Homomorphic Encryption (MKFHE) offers a powerful solution for secure multi-party computations, where data encrypted under different keys can be jointly computed without decryption. However, existing MKFHE schemes still face challenges...

  • Article
  • Open Access
42 Citations
8,387 Views
22 Pages

3 July 2015

With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people’s lives. The battery resources of senso...

  • Article
  • Open Access
11 Citations
3,329 Views
20 Pages

15 January 2024

In the current context in which user authentication is the first line of defense against emerging attacks and can be considered a defining element of any security infrastructure, the need to adopt alternative, non-invasive, contactless, and scalable...

  • Article
  • Open Access
8 Citations
3,197 Views
31 Pages

Adaptive Autonomous Protocol for Secured Remote Healthcare Using Fully Homomorphic Encryption (AutoPro-RHC)

  • Ruey-Kai Sheu,
  • Yuan-Cheng Lin,
  • Mayuresh Sunil Pardeshi,
  • Chin-Yin Huang,
  • Kai-Chih Pai,
  • Lun-Chi Chen and
  • Chien-Chung Huang

16 October 2023

The outreach of healthcare services is a challenge to remote areas with affected populations. Fortunately, remote health monitoring (RHM) has improved the hospital service quality and has proved its sustainable growth. However, the absence of securit...

  • Article
  • Open Access
1 Citations
3,548 Views
8 Pages

This study focuses on efficiently finding the location of the maximum value for large-scale values encrypted by the CKKS (Cheon—Kim—Kim–Song) method. To find the maximum value, logM+1 comparison operations and logM rotation operatio...

  • Article
  • Open Access
15 Citations
5,331 Views
16 Pages

Fully Homomorphically Encrypted Deep Learning as a Service

  • George Onoufriou,
  • Paul Mayfield and
  • Georgios Leontidis

Fully Homomorphic Encryption (FHE) is a relatively recent advancement in the field of privacy-preserving technologies. FHE allows for the arbitrary depth computation of both addition and multiplication, and thus the application of abelian/polynomial...

  • Article
  • Open Access
6 Citations
3,755 Views
24 Pages

24 October 2022

We present automatically parameterised Fully Homomorphic Encryption (FHE) for encrypted neural network inference and exemplify our inference over FHE-compatible neural networks with our own open-source framework and reproducible examples. We use the...

  • Article
  • Open Access
9 Citations
8,399 Views
13 Pages

Empirical Study of Fully Homomorphic Encryption Using Microsoft SEAL

  • Francisco-Jose Valera-Rodriguez,
  • Pilar Manzanares-Lopez and
  • Maria-Dolores Cano

10 May 2024

In the context of the increasing integration of Internet of Things technologies and the growing importance of data lakes, the need for robust cybersecurity measures to protect privacy without compromising data utility becomes key. Aiming to address t...

  • Article
  • Open Access
8 Citations
3,546 Views
18 Pages

Privacy-Preserving Feature Selection with Fully Homomorphic Encryption

  • Shinji Ono,
  • Jun Takata,
  • Masaharu Kataoka,
  • Tomohiro I,
  • Kilho Shin and
  • Hiroshi Sakamoto

30 June 2022

For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value x(Fi) and the class label x(C) are given for each xD and FiF....

  • Article
  • Open Access
7 Citations
3,657 Views
20 Pages

Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption

  • Cunqun Fan,
  • Peiheng Jia,
  • Manyun Lin,
  • Lan Wei,
  • Peng Guo,
  • Xiangang Zhao and
  • Ximeng Liu

8 April 2023

With the development of cloud computing and big data, secure multi-party computation, which can collaborate with multiple parties to deal with a large number of transactions, plays an important role in protecting privacy. Private set intersection (PS...

  • Article
  • Open Access
9 Citations
6,921 Views
13 Pages

6 October 2022

At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use...

  • Article
  • Open Access
12 Citations
3,826 Views
14 Pages

15 May 2023

The Internet of Things or “IoT” determines the highly interconnected network of heterogeneous devices where each type of communication seems to be possible, even unauthorized. Consequently, the security requirement for these networks beca...

  • Article
  • Open Access
3 Citations
4,803 Views
18 Pages

26 July 2021

TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt’ 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and...

  • Article
  • Open Access
9 Citations
3,194 Views
15 Pages

Two-Party Privacy-Preserving Set Intersection with FHE

  • Yunlu Cai,
  • Chunming Tang and
  • Qiuxia Xu

25 November 2020

A two-party private set intersection allows two parties, the client and the server, to compute an intersection over their private sets, without revealing any information beyond the intersecting elements. We present a novel private set intersection pr...

  • Article
  • Open Access
40 Citations
9,072 Views
23 Pages

A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach

  • Fausto Neri da Silva Vanin,
  • Lucas Micol Policarpo,
  • Rodrigo da Rosa Righi,
  • Sandra Marlene Heck,
  • Valter Ferreira da Silva,
  • José Goldim and
  • Cristiano André da Costa

20 December 2022

Personal health records (PHR) represent health data managed by a specific individual. Traditional solutions rely on centralized architectures to store and distribute PHR, which are more vulnerable to security breaches. To address such problems, distr...

  • Article
  • Open Access
2 Citations
4,107 Views
12 Pages

Privacy-preserving neural networks offer a promising solution to train and predict without user privacy leakage, and fully homomorphic encryption (FHE) stands out as one of the key technologies, as it enables homomorphic operations over encrypted dat...

  • Article
  • Open Access
1 Citations
1,508 Views
22 Pages

A Privacy-Preserving Scheme for a Traffic Accident Risk Level Prediction System

  • Pablo Marcillo,
  • Gabriela Suntaxi and
  • Myriam Hernández-Álvarez

29 October 2024

Due to the expansion of Artificial Intelligence (AI), especially Machine Learning (ML), it is more common to face confidentiality regulations about using sensitive data in learning models generally hosted in cloud environments. Confidentiality regula...

  • Article
  • Open Access
1 Citations
2,443 Views
15 Pages

31 January 2024

The bootstrapping procedure has become the main bottleneck affecting the efficiency of all known fully homomorphic encryption (FHE) schemes. The state-of-the-art scheme for efficient bootstrapping, which is called fully homomorphic encryption over th...

  • Article
  • Open Access
11 Citations
5,043 Views
28 Pages

The suggested solution in this work makes use of the parallel processing capability of FPGA to enhance the efficiency of the K-Nearest Neighbor (KNN) algorithm on encrypted data. The suggested technique was assessed utilizing the breast cancer datase...

  • Article
  • Open Access
2 Citations
1,731 Views
28 Pages

This paper explores advancements in the Gentry-Sahai-Waters (GSW) fully homomorphic encryption scheme (FHE), addressing challenges related to message data range limitations and ciphertext size constraints. We leverage the well-known parallelizing tec...

  • Article
  • Open Access
6 Citations
3,628 Views
22 Pages

Homomorphic Comparison for Point Numbers with User-Controllable Precision and Its Applications

  • Heewon Chung,
  • Myungsun Kim,
  • Ahmad Al Badawi,
  • Khin Mi Mi Aung and
  • Bharadwaj Veeravalli

8 May 2020

This work is mainly interested in ensuring users’ privacy in asymmetric computing, such as cloud computing. In particular, because lots of user data are expressed in non-integer data types, privacy-enhanced applications built on fully homomorph...

  • Article
  • Open Access
1,685 Views
28 Pages

Efficient Private Information Retrieval Scheme with Dynamic Database

  • Xin Li,
  • Wenju Xu,
  • Dianhua Tang,
  • Yunfei Cao,
  • Jing Zhang and
  • Wei Zhao

29 August 2025

Private information retrieval (PIR) is a typical application scenario of encrypted computing, which allows users to retrieve data from a database by providing only an encrypted index. In an academic research scenario, multiple parties may entrust the...

  • Article
  • Open Access
19 Citations
5,914 Views
19 Pages

A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine

  • Yasir Iqbal,
  • Shahzaib Tahir,
  • Hasan Tahir,
  • Fawad Khan,
  • Saqib Saeed,
  • Abdullah M. Almuhaideb and
  • Adeel M. Syed

11 June 2022

Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the culture of online consultancy. Thus, there is a need to revamp the con...

  • Article
  • Open Access
12 Citations
3,716 Views
16 Pages

27 February 2023

Due to the rapid development of machine-learning technology, companies can build complex models to provide prediction or classification services for customers without resources. A large number of related solutions exist to protect the privacy of mode...

  • Article
  • Open Access
2 Citations
2,616 Views
12 Pages

Efficient Twiddle Factor Generators for NTT

  • Nari Im,
  • Heehun Yang,
  • Yujin Eom,
  • Seong-Cheon Park and
  • Hoyoung Yoo

Fully Homomorphic Encryption (FHE) allows computations on encrypted data without decryption, providing strong security for sensitive information. However, computational and memory demands for FHE are significant challenges, particularly in the Number...

  • Article
  • Open Access
9 Citations
3,209 Views
17 Pages

24 March 2023

Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applicati...

  • Article
  • Open Access
4 Citations
3,941 Views
20 Pages

SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation

  • Devharsh Trivedi,
  • Aymen Boudguiga,
  • Nesrine Kaaniche and
  • Nikos Triandopoulos

Security log collection and storage are essential for organizations worldwide. Log analysis can help recognize probable security breaches and is often required by law. However, many organizations commission log management to Cloud Service Providers (...

  • Article
  • Open Access
1,117 Views
29 Pages

This paper enhances the multikey scenario in the Gentry–Sahai–Waters (GSW) fully homomorphic encryption scheme to increase its real-world applicability. We integrate the advantages of two existing GSW multikey approaches: one enabling dis...

  • Article
  • Open Access
7 Citations
7,094 Views
19 Pages

Enhancing Privacy in Large Language Model with Homomorphic Encryption and Sparse Attention

  • Lexin Zhang,
  • Changxiang Li,
  • Qi Hu,
  • Jingjing Lang,
  • Sirui Huang,
  • Linyue Hu,
  • Jingwen Leng,
  • Qiuhan Chen and
  • Chunli Lv

11 December 2023

In response to the challenges of personal privacy protection in the dialogue models of the information era, this study introduces an innovative privacy-preserving dialogue model framework. This framework seamlessly incorporates Fully Homomorphic Encr...

  • Article
  • Open Access
486 Views
30 Pages

11 December 2025

The Internet of Medical Things (IoMT) improves healthcare delivery through many medical applications. Because of medical data sensitivity and limited resources of wearable technology, privacy and security are significant challenges. Traditional encry...

  • Article
  • Open Access
5 Citations
3,044 Views
19 Pages

Non-Interactive Decision Trees and Applications with Multi-Bit TFHE

  • Jestine Paul,
  • Benjamin Hong Meng Tan,
  • Bharadwaj Veeravalli and
  • Khin Mi Mi Aung

18 September 2022

Machine learning classification algorithms, such as decision trees and random forests, are commonly used in many applications. Clients who want to classify their data send them to a server that performs their inference using a trained model. The clie...

  • Article
  • Open Access
1 Citations
1,896 Views
12 Pages

18 December 2023

The security of several fully homomorphic encryption (FHE) schemes depends on the intractability assumption of the approximate common divisor (ACD) problem over integers. Subsequent efforts to solve the ACD problem as well as its variants were also d...

of 3