Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification
Abstract
References
Index Terms
- Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification
Recommendations
Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption
IH&MMSec '22: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia SecurityThis paper proposes a novel collaborative decryption protocol for the Brakerski-Fan-Vercauteren (BFV) homomorphic encryption scheme in a multiparty distributed setting, and puts it to use in designing a leakage-resilient biometric identification ...
A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
A new method is presented to privately outsource computation of different users. As a significant cryptographic primitive in cloud computing, homomorphic encryption HE can evaluate on ciphertext directly without decryption, thus avoid information ...
Cryptanalysis of a homomorphic encryption scheme
Homomorphic encryption allows to make specific operations on private data which stays encrypted. While applications such as cloud computing require to have a practical solution, the encryption scheme must be secure. In this article, we detail and ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/87a85e95-1472-474e-b063-a632abcb58e6/3658664.cover.jpg)
- General Chair:
- Fernando Pérez-González,
- Program Chairs:
- Pedro Comesaña-Alfaro,
- Christian Krätzer,
- Hong Vicky Zhao
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- 3IA Côte dðAzur program
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 19Total Downloads
- Downloads (Last 12 months)19
- Downloads (Last 6 weeks)19
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in