-
61
New secure distributed secret sharing scheme of n product
Published 2014-11-01Subjects: Get full text
Article -
62
Privacy-preserving incentive mechanism for integrated demand response: A homomorphic encryption-based approach
Published 2025-03-01Subjects: Get full text
Article -
63
RLWE-based key-policy ABE scheme
Published 2016-10-01Subjects: “…attribute-based fully homomorphic encryption…”
Get full text
Article -
64
Privacy-preserving digital rights management scheme in cloud computing
Published 2014-02-01Subjects: Get full text
Article -
65
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
Published 2015-09-01Subjects: Get full text
Article -
66
Identity-based fully homomorphic encryption from learning with error problem
Published 2014-02-01Subjects: Get full text
Article -
67
A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts
Published 2025-01-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
68
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01Subjects: Get full text
Article -
69
Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform
Published 2024-09-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
70
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01Subjects: Get full text
Article -
71
Efficient identity-based fully homomorphic encryption over NTRU
Published 2017-01-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
72
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01Subjects: “…multi-key fully homomorphic encryption (MK-FHE)…”
Get full text
Article -
73
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01Subjects: “…threshold quantum homomorphic encryption…”
Get full text
Article -
74
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
Published 2007-01-01Subjects: Get full text
Article -
75
A Survey of Differential Privacy Techniques for Federated Learning
Published 2025-01-01Subjects: Get full text
Article -
76
Secure network coding method merged with timestamp and homomorphic signature
Published 2013-04-01Subjects: “…homomorphic signature…”
Get full text
Article -
77
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01Subjects: Get full text
Article -
78
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Published 2015-02-01Subjects: Get full text
Article -
79
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01Subjects: Get full text
Article -
80
A Method to Attack the FHE Schemes Based on the Hardness of PACDP
Published 2013-03-01Subjects: “…fu11y homomorphic encryption…”
Get full text
Article