Secure searching of biomarkers through hybrid homomorphic encryption scheme
暂无分享,去创建一个
[1] Kristin E. Lauter,et al. Private genome analysis through homomorphic encryption , 2015, BMC Medical Informatics and Decision Making.
[2] Steven G. Johnson,et al. The Design and Implementation of FFTW3 , 2005, Proceedings of the IEEE.
[3] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[4] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[5] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, EUROCRYPT.
[6] Léo Ducas,et al. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.
[7] Jung Hee Cheon,et al. Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data , 2016, IEEE Transactions on Information Forensics and Security.
[8] Yaniv Erlich,et al. Routes for breaching and protecting genetic privacy , 2013, Nature Reviews Genetics.
[9] Nicolas Gama,et al. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.
[10] Jung Hee Cheon,et al. Homomorphic Computation of Edit Distance , 2015, IACR Cryptol. ePrint Arch..
[11] Alison Bowes,et al. Early telemedicine training and counselling after hospitalization in patients with severe chronic obstructive pulmonary disease: a feasibility study , 2015, BMC Medical Informatics and Decision Making.
[12] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[13] Jean-Pierre Hubaux,et al. Addressing the concerns of the lacks family: quantification of kin genomic privacy , 2013, CCS.
[14] Michael Naehrig,et al. Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.
[15] Takeshi Koshiba,et al. Secure pattern matching using somewhat homomorphic encryption , 2013, CCSW.
[16] Carl A. Gunter,et al. Privacy in the Genomic Era , 2014, ACM Comput. Surv..
[17] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[18] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[19] Craig Gentry,et al. Private Database Queries Using Somewhat Homomorphic Encryption , 2013, ACNS.
[20] Jung Hee Cheon,et al. Search-and-compute on Encrypted Data , 2015, IACR Cryptol. ePrint Arch..