Many secure data analysis tasks, such as secure clustering and classification, require efficient mechanisms to convert the intermediate encrypted integers into the corresponding encryptions of bits. The existing bit-decomposition algorithms either do not offer sufficient security or are computationally inefficient. In order to provide better security as well as to improve efficiency, we propose a novel probabilistic-based secure bit-decomposition protocol for values encrypted using public key additive homomorphic encryption schemes. The proposed protocol guarantees security as per the semi-honest security definition of secure multi-party computation (MPC) and is also very efficient compared to the existing method. Our protocol always return...
For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that ...
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduct...
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted i...
With a practical homomorphic encryption algorithm, cloud service providers can operate on users\u27 ...
When processing data in the encrypted domain, homomorphic encryption can be used to enable linear op...
A framework is introduced for efficiently computing with encrypted data. We assume a semi-honest sec...
We propose and evaluate a secure-multiparty-computation (MPC) solution in the semi-honest model with...
AbstractA new probabilistic model of data encryption is introduced. For this model, under suitable c...
We propose a protocol for secure comparison of integers based on homomorphic encryption.We also prop...
We introduce a new approach to multiparty computation (MPC) bas-ing it on homomorphic threshold cryp...
International audienceWe extend the fully homomorphic encryption scheme over the integers of van Dij...
International audienceIn 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, ...
We consider the framework of secure n-party computation based on threshold homomorphic cryptosystems...
Part 3: CryptographyInternational audienceWe propose a secure integer-wise homomorphic division algo...
For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that ...
For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that ...
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduct...
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted i...
With a practical homomorphic encryption algorithm, cloud service providers can operate on users\u27 ...
When processing data in the encrypted domain, homomorphic encryption can be used to enable linear op...
A framework is introduced for efficiently computing with encrypted data. We assume a semi-honest sec...
We propose and evaluate a secure-multiparty-computation (MPC) solution in the semi-honest model with...
AbstractA new probabilistic model of data encryption is introduced. For this model, under suitable c...
We propose a protocol for secure comparison of integers based on homomorphic encryption.We also prop...
We introduce a new approach to multiparty computation (MPC) bas-ing it on homomorphic threshold cryp...
International audienceWe extend the fully homomorphic encryption scheme over the integers of van Dij...
International audienceIn 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, ...
We consider the framework of secure n-party computation based on threshold homomorphic cryptosystems...
Part 3: CryptographyInternational audienceWe propose a secure integer-wise homomorphic division algo...
For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that ...
For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that ...
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduct...
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted i...