Practical Privacy-Preserving Medical Diagnosis Using Homomorphic Encryption
暂无分享,去创建一个
Gianpiero Costantino | Fabio Martinelli | Renaud Sirdey | Thanh Hai Nguyen | Sergiu Carpov | Gianpiero Costantino | F. Martinelli | R. Sirdey | Sergiu Carpov | T. Nguyen
[1] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[2] Anne Canteaut,et al. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract , 2012, ASIACRYPT.
[3] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[4] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[5] Craig Gentry,et al. Packed Ciphertexts in LWE-Based Homomorphic Encryption , 2013, Public Key Cryptography.
[6] Josef Spillner,et al. Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments , 2015, 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC).
[7] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[8] Renaud Sirdey,et al. Another Compression Method for Homomorphic Ciphertexts , 2016, SCC@AsiaCCS.
[9] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[10] Anne Canteaut,et al. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression , 2016, Journal of Cryptology.
[11] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[12] Guy Gogniat,et al. Towards Practical Program Execution over Fully Homomorphic Encryption Schemes , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[13] Tatu Ylönen,et al. The Secure Shell (ssh) Transport Layer Protocol , 2006 .
[14] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[15] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[16] Michael Naehrig,et al. Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.
[17] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[18] Guy Gogniat,et al. Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain , 2013, IEEE Signal Processing Magazine.
[19] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[20] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[21] Renaud Sirdey,et al. A compression method for homomorphic ciphertexts , 2015, IACR Cryptol. ePrint Arch..
[22] Michael Naehrig,et al. ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.
[23] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[24] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[25] Mihir Bellare,et al. Foundations of garbled circuits , 2012, CCS.
[26] Renaud Sirdey,et al. Armadillo: A Compilation Chain for Privacy Preserving Applications , 2015, IACR Cryptol. ePrint Arch..
[27] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[28] Martin R. Albrecht,et al. Ciphers for MPC and FHE , 2015, IACR Cryptol. ePrint Arch..