Privacy-preserving multi-user outsourced computation for boolean circuits

X Liu, G Yang, W Susilo, K He… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the prevalence of outsourced computation, such as Machine Learning as a Service,
protecting the privacy of sensitive data throughout the whole computation is a critical yet …

Research review on the application of homomorphic encryption in database privacy protection

Y Ma, J Zhao, K Li, Y Cao, H Chen… - International Journal of …, 2021 - igi-global.com
With the advent and development of database applications such as big data and data
mining, how to ensure the availability of data without revealing sensitive information has …

Secure search on encrypted data via multi-ring sketch

A Akavia, D Feldman, H Shaul - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
We consider the secure search problem of retrieving from an unsorted data cost=(x_1,..., xm)
an item (i, xi) matching a given lookup value l (for a generic matching criterion either …

Coresets for gaussian mixture models of any shape

D Feldman, Z Kfir, X Wu - arXiv preprint arXiv:1906.04895, 2019 - arxiv.org
An $\varepsilon $-coreset for a given set $ D $ of $ n $ points, is usually a small weighted
set, such that querying the coreset\emph {provably} yields a $(1+\varepsilon) $-factor …

A geometric approach to homomorphic secret sharing

Y Ishai, RWF Lai, G Malavolta - IACR International Conference on Public …, 2021 - Springer
Abstract An (n, m, t)-homomorphic secret sharing (HSS) scheme allows n clients to share
their inputs across m servers, such that the inputs are hidden from any t colluding servers …

Secure search via multi-ring fully homomorphic encryption

A Akavia, D Feldman, H Shaul - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Secure search is the problem of securely retrieving from a database table (or any unsorted
array) the records matching specified attributes, as in SQL``SELECT... WHERE...''queries …

Secure Search over Multi-key Homomorphically Encrypted Data

B Ganesh, P Palmieri - 2023 7th International Conference on …, 2023 - ieeexplore.ieee.org
Homomorphic Encryption (HE) is a very attractive solution to ensure privacy when
outsourcing confidential data to the cloud, as it enables computation on the data without de …

Efficient evaluation of activation functions over encrypted data

P Thaine, S Gorbunov, G Penn - 2019 IEEE Security and …, 2019 - ieeexplore.ieee.org
We describe a method for approximating any bounded activation function given encrypted
input data. The utility of our method is exemplified by simulating it within two typical machine …

Future Application Prospects

L Liu, S Wei, J Zhu, C Deng - Software Defined Chips: Volume II, 2022 - Springer
Driven by artificial intelligence, cloud computing, autonomous driving, the Internet of Things,
blockchain, quantum computing, and other emerging technologies and applications …

[图书][B] Software Defined Chips: Volume II

L Liu, S Wei, J Zhu, C Deng - 2022 - Springer
Our team has been studying dynamically reconfigurable chips since 2006. In 2014, we wrote
the book “Reconfigurable Computing” and published it in Science Press. The book …