December 2019
·
40 Reads
·
4 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
December 2019
·
40 Reads
·
4 Citations
October 2019
·
129 Reads
·
8 Citations
... Since 1987, Goldreich and others have conducted in-depth research on MPC [2][3]. The research problems mainly include the following aspects: the Millionaire problem [1,[4][5][6][7], confidential computational geometry problem [8][9][10], confidential data mining problem [11][12][13], confidential statistical analysis [14][15], confidential set relationship judgment [16][17], etc. The models of MPC computing include semi-honest model and malicious model. ...
October 2019
... To the best of our knowledge, there are currently very few cryptographicrelated constructions explicitly based on GA. We highlight a fully homomorphic encryption (FHE) scheme [36] that combines GA with number theoretic functions [37], and a somewhat homomorphic encryption (SWHE) scheme that yields a GA-based framework for image processing [38]. The closest construction to the key update we propose in this work, a rather limited version of it, was discussed in [39]. ...
December 2019