Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

A systematic review of homomorphic encryption and its contributions in healthcare industry

K Munjal, R Bhatia - Complex & Intelligent Systems, 2023 - Springer
Cloud computing and cloud storage have contributed to a big shift in data processing and its
use. Availability and accessibility of resources with the reduction of substantial work is one of …

Splitfed: When federated learning meets split learning

C Thapa, PCM Arachchige, S Camtepe… - Proceedings of the AAAI …, 2022 - ojs.aaai.org
Federated learning (FL) and split learning (SL) are two popular distributed machine learning
approaches. Both follow a model-to-data scenario; clients train and test machine learning …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Delphi: A cryptographic inference system for neural networks

P Mishra, R Lehmkuhl, A Srinivasan, W Zheng… - Proceedings of the …, 2020 - dl.acm.org
Many companies provide neural network prediction services to users for a wide range of
applications. However, current prediction systems compromise one party's privacy: either the …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

Bts: An accelerator for bootstrappable fully homomorphic encryption

S Kim, J Kim, MJ Kim, W Jung, J Kim, M Rhu… - Proceedings of the 49th …, 2022 - dl.acm.org
Homomorphic encryption (HE) enables the secure offloading of computations to the cloud by
providing computation on encrypted data (ciphertexts). HE is based on noisy encryption …

{GAZELLE}: A low latency framework for secure neural network inference

C Juvekar, V Vaikuntanathan… - 27th USENIX security …, 2018 - usenix.org
The growing popularity of cloud-based machine learning raises natural questions about the
privacy guarantees that can be provided in such settings. Our work tackles this problem in …

A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

Homomorphic encryption for arithmetic of approximate numbers

JH Cheon, A Kim, M Kim, Y Song - … on the Theory and Applications of …, 2017 - Springer
We suggest a method to construct a homomorphic encryption scheme for approximate
arithmetic. It supports an approximate addition and multiplication of encrypted messages …