-
41
A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts
Published 2025-01-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
42
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01Subjects: Get full text
Article -
43
Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform
Published 2024-09-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
44
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01Subjects: Get full text
Article -
45
Efficient identity-based fully homomorphic encryption over NTRU
Published 2017-01-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
46
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01Subjects: “…multi-key fully homomorphic encryption (MK-FHE)…”
Get full text
Article -
47
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01Subjects: “…threshold quantum homomorphic encryption…”
Get full text
Article -
48
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
Published 2007-01-01Subjects: Get full text
Article -
49
A Survey of Differential Privacy Techniques for Federated Learning
Published 2025-01-01Subjects: “…lattice-based homomorphic encryption…”
Get full text
Article -
50
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01Subjects: Get full text
Article -
51
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Published 2015-02-01Subjects: Get full text
Article -
52
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01Subjects: Get full text
Article -
53
A Method to Attack the FHE Schemes Based on the Hardness of PACDP
Published 2013-03-01Subjects: “…fu11y homomorphic encryption…”
Get full text
Article -
54
Cross-Chain Identity Authentication Method Based on Relay Chain
Published 2025-01-01Subjects: Get full text
Article