Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

A systematic review of homomorphic encryption and its contributions in healthcare industry

K Munjal, R Bhatia - Complex & Intelligent Systems, 2023 - Springer
Cloud computing and cloud storage have contributed to a big shift in data processing and its
use. Availability and accessibility of resources with the reduction of substantial work is one of …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

Bts: An accelerator for bootstrappable fully homomorphic encryption

S Kim, J Kim, MJ Kim, W Jung, J Kim, M Rhu… - Proceedings of the 49th …, 2022 - dl.acm.org
Homomorphic encryption (HE) enables the secure offloading of computations to the cloud by
providing computation on encrypted data (ciphertexts). HE is based on noisy encryption …

A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

Precision health data: Requirements, challenges and existing techniques for data security and privacy

C Thapa, S Camtepe - Computers in biology and medicine, 2021 - Elsevier
Precision health leverages information from various sources, including omics, lifestyle,
environment, social media, medical records, and medical insurance claims to enable …

On the security of homomorphic encryption on approximate numbers

B Li, D Micciancio - Annual International Conference on the Theory and …, 2021 - Springer
We present passive attacks against CKKS, the homomorphic encryption scheme for
arithmetic on approximate numbers presented at Asiacrypt 2017. The attack is both …

Cryptodl: Deep neural networks over encrypted data

E Hesamifard, H Takabi, M Ghasemi - arXiv preprint arXiv:1711.05189, 2017 - arxiv.org
Machine learning algorithms based on deep neural networks have achieved remarkable
results and are being extensively used in different domains. However, the machine learning …

Multi-key privacy-preserving deep learning in cloud computing

P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu… - Future Generation …, 2017 - Elsevier
Deep learning has attracted a lot of attention and has been applied successfully in many
areas such as bioinformatics, imaging processing, game playing and computer security etc …

Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits

C Weng, K Yang, J Katz, X Wang - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Efficient zero-knowledge (ZK) proofs for arbitrary boolean or arithmetic circuits have recently
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …