2017
DOI: 10.1007/978-3-319-68542-7_21
|View full text |Cite
|
Sign up to set email alerts
|

Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…[4]- [10]. Subsequently, nowadays FHE has been widely adopted for cloud security [11] [12], e-health care privacy [13], blockchain, [14] i.e., artificial intelligence Cortex blockchain adopted somewhat FHE (SWFHE) to train and infer the model. The first generation methods, however, were somewhat similar, but they had different theoretical assumptions with complex methodologies.…”
Section: Introductionmentioning
confidence: 99%
“…[4]- [10]. Subsequently, nowadays FHE has been widely adopted for cloud security [11] [12], e-health care privacy [13], blockchain, [14] i.e., artificial intelligence Cortex blockchain adopted somewhat FHE (SWFHE) to train and infer the model. The first generation methods, however, were somewhat similar, but they had different theoretical assumptions with complex methodologies.…”
Section: Introductionmentioning
confidence: 99%