Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption
Abstract
References
Index Terms
- Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption
Recommendations
A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
A new method is presented to privately outsource computation of different users. As a significant cryptographic primitive in cloud computing, homomorphic encryption HE can evaluate on ciphertext directly without decryption, thus avoid information ...
Cryptanalysis of a homomorphic encryption scheme
Homomorphic encryption allows to make specific operations on private data which stays encrypted. While applications such as cloud computing require to have a practical solution, the encryption scheme must be secure. In this article, we detail and ...
Homomorphic encryption supporting logical operations
ICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication EngineeringHomomorphic encryption is a form of encryption that allows computations to be carried out on ciphertext and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintexts. The feature of homomorphic ...
Comments
Information & Contributors
Information
Published In
- Chair:
- Jianying Zhou,
- Co-chair:
- Tony Q. S. Quek,
- Program Chairs:
- Debin Gao,
- Alvaro Cardenas
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- European Union?s Horizon 2020 research and innovation programme under the Marie Sk?odowska-Curie grant agreement
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 195Total Downloads
- Downloads (Last 12 months)195
- Downloads (Last 6 weeks)57
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in