2018
DOI: 10.1109/access.2018.2819189
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 111 publications
(60 citation statements)
references
References 36 publications
0
60
0
Order By: Relevance
“…For privacy-preserving GWAS computation, we applied an HE scheme called HEAAN proposed by Cheon et al [3,4], which supports approximate computation of real numbers in encrypted state. Efficiency of HEAAN in the real world has been proved by showing its application in various fields including machine learning [8,22,23] and cyber physical system [24]. The winning solution of iDASH competition in 2017 also applied HEAAN as an HE scheme for privacy-preserving logistic regression on genomic data.…”
Section: Approximate Homomorphic Encryption Scheme Heaanmentioning
confidence: 99%
“…For privacy-preserving GWAS computation, we applied an HE scheme called HEAAN proposed by Cheon et al [3,4], which supports approximate computation of real numbers in encrypted state. Efficiency of HEAAN in the real world has been proved by showing its application in various fields including machine learning [8,22,23] and cyber physical system [24]. The winning solution of iDASH competition in 2017 also applied HEAAN as an HE scheme for privacy-preserving logistic regression on genomic data.…”
Section: Approximate Homomorphic Encryption Scheme Heaanmentioning
confidence: 99%
“…At the expense of this bit accuracy, HEAAN supports very fast arithmetic operations on word-sized encrypted data. is fast computation speed allows HEAAN to be used in many fields such as machine learning and machine control [17,18]. In addition, unlike TFHE, HEAAN has the advantage of providing a complete SIMD function.…”
Section: Heaan Heaan's Ciphertext Can Contain Multiplementioning
confidence: 99%
“…Chim et al [15] utilized Paillier homomorphic encryption and the bloom filters to proposed an aggregation scheme. Cheon et al [16] adopted homomorphic cryptography, which removes risks on the management of the secret key. Therefore, eliminating the requirement to encrypt and decrypt the message within the network.…”
Section: B Homomorphic Encryption Algorithmsmentioning
confidence: 99%