Menu
×
Main Library
9 a.m. - 6 p.m.
Phone: (843) 805-6930
McClellanville Library
9 a.m. - 1 p.m.
Phone: (843) 887-3699
Folly Beach Library
9 a.m. - 1 p.m.
Phone: (843) 588-2001
Miss Jane's Building (Edisto Library Temporary Location)
9 a.m. – 3 p.m.
Phone: (843) 869-2355
West Ashley Library
9 a.m. - 4 p.m.
Phone: (843) 766-6635
John L. Dart Library
9 a.m. - 6 p.m.
Phone: (843) 722-7550
St. Paul's/Hollywood Library
9 a.m. - 5 p.m.
Phone: (843) 889-3300
Mt. Pleasant Library
9 a.m. – 6 p.m.
Phone: (843) 849-6161
Dorchester Road Library
9 a.m. - 6 p.m.
Phone: (843) 552-6466
Edgar Allan Poe/Sullivan's Island Library
9 a.m. - 6 p.m.
Phone: (843) 883-3914
John's Island Library
9 a.m. - 6 p.m.
Phone: (843) 559-1945
Wando Mount Pleasant Library
9 a.m. - 6 p.m.
Phone: (843) 805-6888
Otranto Road Library
9 a.m. - 6 p.m.
Phone: (843) 572-4094
Hurd/St. Andrews Library
9 a.m. - 6 p.m.
Phone: (843) 766-2546
Baxter-Patrick James Island
9 a.m. - 6 p.m.
Phone: (843) 795-6679
Bees Ferry West Ashley Library
9 a.m. - 6 p.m.
Phone: (843) 805-6892
Village Library
9 a.m. - 6 p.m.
Phone: (843) 884-9741
Keith Summey North Charleston Library
9 a.m. – 6 p.m.
Phone: (843) 744-2489
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Today's Hours
Main Library
9 a.m. - 6 p.m.
Phone: (843) 805-6930
McClellanville Library
9 a.m. - 1 p.m.
Phone: (843) 887-3699
Folly Beach Library
9 a.m. - 1 p.m.
Phone: (843) 588-2001
Miss Jane's Building (Edisto Library Temporary Location)
9 a.m. – 3 p.m.
Phone: (843) 869-2355
West Ashley Library
9 a.m. - 4 p.m.
Phone: (843) 766-6635
John L. Dart Library
9 a.m. - 6 p.m.
Phone: (843) 722-7550
St. Paul's/Hollywood Library
9 a.m. - 5 p.m.
Phone: (843) 889-3300
Mt. Pleasant Library
9 a.m. – 6 p.m.
Phone: (843) 849-6161
Dorchester Road Library
9 a.m. - 6 p.m.
Phone: (843) 552-6466
Edgar Allan Poe/Sullivan's Island Library
9 a.m. - 6 p.m.
Phone: (843) 883-3914
John's Island Library
9 a.m. - 6 p.m.
Phone: (843) 559-1945
Wando Mount Pleasant Library
9 a.m. - 6 p.m.
Phone: (843) 805-6888
Otranto Road Library
9 a.m. - 6 p.m.
Phone: (843) 572-4094
Hurd/St. Andrews Library
9 a.m. - 6 p.m.
Phone: (843) 766-2546
Baxter-Patrick James Island
9 a.m. - 6 p.m.
Phone: (843) 795-6679
Bees Ferry West Ashley Library
9 a.m. - 6 p.m.
Phone: (843) 805-6892
Village Library
9 a.m. - 6 p.m.
Phone: (843) 884-9741
Keith Summey North Charleston Library
9 a.m. – 6 p.m.
Phone: (843) 744-2489
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Patron Login
menu
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem.
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
- Author(s): Prantl, Thomas; Horn, Lukas; Engel, Simon; Iffländer, Lukas; Beierlieb, Lukas; Krupitzer, Christian; Bauer, André; Sakarvadia, Mansi; Foster, Ian; Kounev, Samuel
- Source:
International Journal of Information Security; Apr2024, Vol. 23 Issue 2, p1149-1169, 21p- Subject Terms:
- Source:
- Additional Information
- Abstract: Cloud computing has become increasingly popular due to its scalability, cost-effectiveness, and ability to handle large volumes of data. However, entrusting (sensitive) data to a third party raises concerns about data security and privacy. Homomorphic encryption is one solution that allows users to store and process data in a public cloud without the cloud provider having access to it. Currently, homomorphic encryption libraries only support addition and multiplication; other mathematical functions must be implemented by the user. To this end, we discuss and implement the division, exponential, square root, logarithm, minimum, and maximum function, using the CKKS cryptosystem of the OpenFHE library. To demonstrate that complex applications can be realized with this extended function set, we have used it to homomorphically realize the Box–Cox transform, which is used in many real-world applications, e.g., time-series forecasts. Our results show how the number of iterations required to achieve a given accuracy varies depending on the function. In addition, the execution time for each function is independent of the input and is in the range of ten seconds on a reference machine. With this work, we provide users with insights on how to extend the original restricted function set of the CKKS cryptosystem of the OpenFHE library with basic mathematical functions. [ABSTRACT FROM AUTHOR]
- Abstract: Copyright of International Journal of Information Security is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Abstract:
Contact CCPL
Copyright 2022 Charleston County Public Library Powered By EBSCO Stacks 3.3.0 [350.3] | Staff Login
No Comments.