Skip to Content

369 Results Found

  • Review
  • Open Access
20 Citations
7,537 Views
29 Pages

1 July 2023

The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used. However...

  • Article
  • Open Access
2 Citations
1,525 Views
15 Pages

11 May 2025

Homomorphic encryption is an important means for cloud computing to ensure information security when outsourcing data. Among them, threshold fully homomorphic encryption (ThFHE) is a key enabler for homomorphic encryption and, from a wider perspectiv...

  • Article
  • Open Access
1,242 Views
24 Pages

Machine-learning applications are becoming increasingly widespread. However, machine learning is highly dependent on high-quality, large-scale training data. Due to the limitations of data privacy and security, in order to accept more user data, user...

  • Article
  • Open Access
1,304 Views
26 Pages

3 December 2025

Homomorphic encryption enables computations to be performed directly on encrypted data, ensuring data confidentiality even in untrusted or distributed environments. Although this approach provides strong theoretical security, its practical adoption r...

  • Article
  • Open Access
1,006 Views
23 Pages

Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information. Homomorphic encryption allows computations on encr...

  • Article
  • Open Access
17 Citations
10,183 Views
17 Pages

Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing

  • Raphael Kiesel,
  • Marvin Lakatsch,
  • Alexander Mann,
  • Karl Lossie,
  • Felix Sohnius and
  • Robert H. Schmitt

6 February 2023

Homomorphic encryption enables secure cloud computing over the complete data lifecycle. As so-called in-use encryption methodology, it allows using encrypted data for, e.g., data analysis—in contrast to classic encryption methods. In-use encryp...

  • Feature Paper
  • Review
  • Open Access
5 Citations
4,683 Views
37 Pages

Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives

  • Siddhartha Siddhiprada Bhoi,
  • Arathi Arakala,
  • Amy Beth Corman and
  • Asha Rao

Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computa...

  • Article
  • Open Access
16 Citations
6,883 Views
13 Pages

24 August 2023

With the increasing number of edge devices connecting to the cloud for storage and analysis, concerns about security and data privacy have become more prominent. Homomorphic encryption (HE) provides a promising solution by not only preserving data pr...

  • Article
  • Open Access
4 Citations
3,888 Views
22 Pages

Secure aggregation of local learning model parameters is crucial for achieving privacy-preserving federated learning. This paper presents a novel and practical aggregation method that effectively combines the advantages of masking-based aggregation w...

  • Article
  • Open Access
52 Citations
7,910 Views
17 Pages

Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

  • Rafik Hamza,
  • Alzubair Hassan,
  • Awad Ali,
  • Mohammed Bakri Bashir,
  • Samar M. Alqhtani,
  • Tawfeeg Mohmmed Tawfeeg and
  • Adil Yousif

6 April 2022

Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without f...

  • Article
  • Open Access
7 Citations
3,935 Views
15 Pages

Is Homomorphic Encryption-Based Deep Learning Secure Enough?

  • Jinmyeong Shin,
  • Seok-Hwan Choi and
  • Yoon-Ho Choi

24 November 2021

As the amount of data collected and analyzed by machine learning technology increases, data that can identify individuals is also being collected in large quantities. In particular, as deep learning technology—which requires a large amount of a...

  • Article
  • Open Access
349 Citations
28,734 Views
20 Pages

Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated...

  • Article
  • Open Access
4 Citations
2,841 Views
15 Pages

Secure Control of Linear Controllers Using Fully Homomorphic Encryption

  • Jingshan Pan,
  • Tongtong Sui,
  • Wen Liu,
  • Jizhi Wang,
  • Lingrui Kong,
  • Yue Zhao and
  • Zhiqiang Wei

7 December 2023

In actual operation, there are security risks to the data of the network control system, mainly in the form of possible eavesdropping of signals in the transmission channel and parameters in the controller leading to data leakage. In this paper, we p...

  • Article
  • Open Access
1,279 Views
18 Pages

We propose a new framework for compile-time ciphertext synthesis in fully homomorphic encryption (FHE) systems. Instead of invoking encryption algorithms at runtime, our method synthesizes ciphertexts from precomputed encrypted basis vectors using on...

  • Article
  • Open Access
1 Citations
4,119 Views
19 Pages

24 July 2023

Multi-key Homomorphic Encryption (MKHE) scheme can homomorphically evaluate ciphertexts encrypted by different keys, which can effectively protect the privacy information of data holders in the joint computing of cloud services. Since the first full...

  • Article
  • Open Access
11 Citations
6,047 Views
13 Pages

This study proposes a blockchain-based system that utilizes fully homomorphic encryption to provide data security and statistical privacy when data are shared with third parties for analysis or research purposes. The proposed system not only provides...

  • Article
  • Open Access
5 Citations
2,360 Views
11 Pages

3 November 2021

Aiming at the problems of large ciphertext size and low efficiency in the current secure multi-party computation (SMC) protocol based on fully homomorphic encryption (FHE), the paper proves that the fully homomorphic encryption scheme that supports m...

  • Article
  • Open Access
5 Citations
2,198 Views
13 Pages

9 January 2023

In most homomorphic encryption schemes based on RLWE, native plaintexts are represented as polynomials in a ring Zt[x]/xN+1, where t is a plaintext modulus and xN+1 is a cyclotomic polynomial with a degree power of two. An encoding scheme should be u...

  • Review
  • Open Access
10 Citations
4,332 Views
22 Pages

Bibliometrics of Machine Learning Research Using Homomorphic Encryption

  • Zhigang Chen,
  • Gang Hu,
  • Mengce Zheng,
  • Xinxia Song and
  • Liqun Chen

3 November 2021

Since the first fully homomorphic encryption scheme was published in 2009, many papers have been published on fully homomorphic encryption and its applications. Machine learning is one of the most interesting applications and has drawn a lot of atten...

  • Article
  • Open Access
24 Citations
12,859 Views
15 Pages

A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security

  • Ahmed EL-YAHYAOUI and
  • Mohamed Dafir ECH-CHERIF EL KETTANI

Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive d...

  • Article
  • Open Access
12 Citations
5,229 Views
24 Pages

Simulation-Based Performance Validation of Homomorphic Encryption Algorithms in the Internet of Things

  • Johannes Kölsch,
  • Christopher Heinz,
  • Axel Ratzke and
  • Christoph Grimm

22 October 2019

IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms. The validation of such systems is a challenge and currently mostly done by prototypes...

  • Article
  • Open Access
58 Citations
7,137 Views
15 Pages

Homomorphic Encryption Based Privacy-Preservation for IoMT

  • Mikail Mohammed Salim,
  • Inyeung Kim,
  • Umarov Doniyor,
  • Changhoon Lee and
  • Jong Hyuk Park

20 September 2021

Healthcare applications store private user data on cloud servers and perform computation operations that support several patient diagnoses. Growing cyber-attacks on hospital systems result in user data being held at ransom. Furthermore, mathematical...

  • Article
  • Open Access
1 Citations
5,930 Views
16 Pages

Ensuring data privacy and security in sensitive domains such as healthcare remains a critical challenge. Homomorphic Encryption (HE) offers a promising approach by enabling computations directly on encrypted data, but the diversity of available schem...

  • Article
  • Open Access
4 Citations
3,379 Views
15 Pages

23 August 2022

Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage. The fully homomorphic encryption approach has problems with excessive noise and the e...

  • Article
  • Open Access
16 Citations
4,941 Views
15 Pages

Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption

  • Bingxue Zhang,
  • Guangguang Lu,
  • Pengpeng Qiu,
  • Xumin Gui and
  • Yang Shi

16 November 2023

Federated learning, as one of the three main technical routes for privacy computing, has been widely studied and applied in both academia and industry. However, malicious nodes may tamper with the algorithm execution process or submit false learning...

  • Article
  • Open Access
1,069 Views
21 Pages

Homomorphic encryption is well known to researchers, yet its application in image processing is scarce. The diversity of image processing algorithms makes homomorphic encryption implementation challenging. Current research often uses the CKKS algorit...

  • Article
  • Open Access
4 Citations
4,487 Views
18 Pages

18 February 2021

The purpose of this study is to provide an efficient search function over a large amount of encrypted data, where the bit length of each item is several tens of bits. For this purpose, we have improved the existing hybrid homomorphic encryption by en...

  • Article
  • Open Access
9 Citations
8,352 Views
13 Pages

Empirical Study of Fully Homomorphic Encryption Using Microsoft SEAL

  • Francisco-Jose Valera-Rodriguez,
  • Pilar Manzanares-Lopez and
  • Maria-Dolores Cano

10 May 2024

In the context of the increasing integration of Internet of Things technologies and the growing importance of data lakes, the need for robust cybersecurity measures to protect privacy without compromising data utility becomes key. Aiming to address t...

  • Article
  • Open Access
14 Citations
5,234 Views
20 Pages

An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications

  • Minghao Yuan,
  • Dongdong Wang,
  • Feng Zhang,
  • Shenqing Wang,
  • Shan Ji and
  • Yongjun Ren

9 December 2022

With the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Il...

  • Article
  • Open Access
1 Citations
2,658 Views
23 Pages

The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. To overcome the existing privacy issues, we can apply fully homomorphic encryption (FHE) to encrypt...

  • Article
  • Open Access
25 Citations
4,659 Views
14 Pages

27 October 2022

Active learning is a technique for maximizing performance of machine learning with minimal labeling effort and letting the machine automatically and adaptively select the most informative data for labeling. Since the labels on records may contain sen...

  • Article
  • Open Access
1 Citations
1,523 Views
22 Pages

6 January 2025

The lattice-based multi-identity fully homomorphic encryption scheme combines the quantum security of lattice cryptography with the advantage of identity-based encryption. However, existing schemes face challenges such as large key sizes, inefficient...

  • Article
  • Open Access
6 Citations
3,260 Views
13 Pages

28 July 2024

This study proposes an privacy-protection method for blockchain transactions based on lightweight homomorphic encryption, aiming to ensure the security of transaction data and user privacy, and improve transaction efficiency. We have built a blockcha...

  • Article
  • Open Access
2 Citations
3,570 Views
21 Pages

5 March 2025

With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. Consequently, homomorphic encryption, being a primary technique for achieving privacy computing, is held in high regard. Nevertheless, the...

  • Review
  • Open Access
20 Citations
7,532 Views
31 Pages

A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks

  • Xiaoqiang Sun,
  • F. Richard Yu,
  • Peng Zhang,
  • Weixin Xie and
  • Xiang Peng

30 July 2020

In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core issues. In order to analyze vehicle data, they need to be computed. Encryption is a common method to guarantee the security of vehicle data in the process of dat...

  • Article
  • Open Access
22 Citations
5,293 Views
20 Pages

4 January 2021

The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can h...

  • Article
  • Open Access
6 Citations
4,934 Views
20 Pages

A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption

  • Mikhail Babenko,
  • Elena Golimblevskaia,
  • Andrei Tchernykh,
  • Egor Shiriaev,
  • Tatiana Ermakova,
  • Luis Bernardo Pulido-Gaytan,
  • Georgii Valuev,
  • Arutyun Avetisyan and
  • Lana A. Gagloeva

Homomorphic encryption (HE) is a promising solution for handling sensitive data in semi-trusted third-party computing environments, as it enables processing of encrypted data. However, applying sophisticated techniques such as machine learning, stati...

  • Article
  • Open Access
8 Citations
5,749 Views
19 Pages

16 May 2023

Today, the rapid development of deep learning has spread across all walks of life, and it can be seen in various fields such as image classification, automatic driving, and medical imaging diagnosis. Convolution Neural Networks (CNNs) are also widely...

  • Article
  • Open Access
4 Citations
2,254 Views
18 Pages

22 May 2023

Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of samp...

  • Article
  • Open Access
2 Citations
1,395 Views
19 Pages

Privacy Protection Anomaly Detection in Smart Grids Based on Combined PHE and TFHE Homomorphic Encryption

  • Yongcai Xiao,
  • Jian Xu,
  • Zejian Lin,
  • Yaxuan Xie,
  • Ruitong Liu,
  • Li Yan and
  • Pengbin Feng

With the growing scale and complexity of smart grids, ensuring both effective anomaly detection and robust privacy protection has become increasingly critical. This paper proposes a ciphertext-based anomaly detection model built upon a collaborative...

  • Article
  • Open Access
28 Citations
6,312 Views
17 Pages

Deep learning models have been applied for varied electrical applications in smart grids with a high degree of reliability and accuracy. The development of deep learning models requires the historical data collected from several electric utilities du...

  • Article
  • Open Access
9 Citations
6,526 Views
23 Pages

14 November 2024

Federated learning avoids centralizing data in a central server by distributing the model training process across devices, thus protecting privacy to some extent. However, existing research shows that model updates (e.g., gradients or weights) exchan...

  • Article
  • Open Access
39 Citations
10,940 Views
14 Pages

BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models

  • Febrianti Wibawa,
  • Ferhat Ozgur Catak,
  • Salih Sarp and
  • Murat Kuzlu

Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated...

  • Article
  • Open Access
201 Views
40 Pages

Multi-Group Fully Homomorphic Encryption Scheme Based on LWE and NTRU

  • Yongheng Li,
  • Jing Wen,
  • Shaoling Liang,
  • Fanqi Kong and
  • Baohua Huang

25 February 2026

Multi-group homomorphic encryption (MGHE) is a pivotal advance in secure multi-party computation, integrating merits of multi-party homomorphic encryption (MPHE) and multi-key homomorphic encryption (MKHE) to eliminate MPHE’s fixed-party limita...

  • Article
  • Open Access
1 Citations
1,510 Views
14 Pages

Lattice-Based Multi-Key Homomorphic Encryption Scheme Without Common Random Strings

  • Hongyi Zhang,
  • Mengxue Shang,
  • Hanzhuo Liu and
  • Dandan Zhang

9 May 2025

Multi-key homomorphic encryption is widely applied into outsourced computing and privacy-preserving applications in multi-user scenarios. However, the existence of Common Random Strings (CRSs) weakens the ability of users to independently generate pu...

  • Article
  • Open Access
4 Citations
3,499 Views
14 Pages

Privacy-Preserved Approximate Classification Based on Homomorphic Encryption

  • Xiaodong Xiao,
  • Ting Wu,
  • Yuanfang Chen and
  • Xingyue Fan

Privacy is a crucial issue for outsourcing computation, which means that clients utilize cloud infrastructure to perform online prediction without disclosing sensitive information. Homomorphic encryption (HE) is one of the promising cryptographic too...

  • Article
  • Open Access
895 Views
18 Pages

16 October 2025

This paper investigates whether ChatGPT, a large language model, can assist in the implementation of lattice-based cryptography and fully homomorphic encryption algorithms, specifically the Ring Learning-with-Errors encryption scheme and the Brakersk...

  • Article
  • Open Access
12 Citations
6,599 Views
17 Pages

9 May 2023

The increasing ubiquity of big data and cloud-based computing has led to increased concerns regarding the privacy and security of user data. In response, fully homomorphic encryption (FHE) was developed to address this issue by enabling arbitrary com...

  • Article
  • Open Access
1 Citations
1,673 Views
18 Pages

Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks

  • Yongli Tang,
  • Menghao Guo,
  • Binyong Li,
  • Kaixin Geng,
  • Jinxia Yu and
  • Baodong Qin

26 December 2024

Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and...

  • Article
  • Open Access
13 Citations
3,190 Views
11 Pages

Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications

  • Juan Luis López Delgado,
  • José Antonio Álvarez Bermejo and
  • Juan Antonio López Ramos

20 October 2022

In this paper, we describe the use of homomorphic encryption techniques in order to not only ensure the data are transmitted in a confidential way, but also to use the encrypted data to provide the manager with statistics that allow them to detect th...

of 8