Privacy-Preserving Rule Induction Using CKKS
Rule-based learning involves using specific rules to categorize or identify datasets. This study introduces a new approach called homomorphic encryption-based rule induction (HORI) algorithm, designed specifically for scenarios where data confidentiality is critical. This method is constructed using...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | Jihyeon Choi, Jina Choi, Younho Lee, Jung-Sik Hong |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10753279/ |
Similar Items
HEaaN-NB: Non-Interactive Privacy-Preserving Naive Bayes Using CKKS for Secure Outsourced Cloud Computing
by: Boyoung Han, et al.
Published: (2024-01-01)
by: Boyoung Han, et al.
Published: (2024-01-01)
EvalRound+ Bootstrapping and Its Rigorous Analysis for CKKS Scheme
by: Hyewon Sung, et al.
Published: (2025-01-01)
by: Hyewon Sung, et al.
Published: (2025-01-01)
Efficient Homomorphic Integer Computer from CKKS
by: Jaehyung Kim
Published: (2025-09-01)
by: Jaehyung Kim
Published: (2025-09-01)
Optimal Design of Key Switching Parameters for Efficient CKKS Bootstrapping
by: Sieun Seo, et al.
Published: (2025-01-01)
by: Sieun Seo, et al.
Published: (2025-01-01)
Healthcare Privacy-Preserving Federated Transfer Learning using CKKS-Based Homomorphic Encryption and PYHFEL Tool
by: Anmar A. Al-Janabi, et al.
Published: (2024-08-01)
by: Anmar A. Al-Janabi, et al.
Published: (2024-08-01)
Cloud-Assisted Privacy-Preserving Spectral Clustering Algorithm Within a Multi-User Setting
by: Lida Xu, et al.
Published: (2024-01-01)
by: Lida Xu, et al.
Published: (2024-01-01)
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption
by: Yao Pan, et al.
Published: (2024-07-01)
by: Yao Pan, et al.
Published: (2024-07-01)
Privacy-preserving mining of association rules based on paillier encryption algorithm
by: Huan XING, et al.
Published: (2016-01-01)
by: Huan XING, et al.
Published: (2016-01-01)
Optimizations of Privacy-Preserving DNN for Low-Latency Inference on Encrypted Data
by: Hyunhoon Lee, et al.
Published: (2023-01-01)
by: Hyunhoon Lee, et al.
Published: (2023-01-01)
Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully Homomorphic Encryption
by: Phap Ngoc Duong, et al.
Published: (2023-05-01)
by: Phap Ngoc Duong, et al.
Published: (2023-05-01)
Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption
by: Hong Cheng
Published: (2025-01-01)
by: Hong Cheng
Published: (2025-01-01)
Precise Approximation of Convolutional Neural Networks for Homomorphically Encrypted Data
by: Junghyun Lee, et al.
Published: (2023-01-01)
by: Junghyun Lee, et al.
Published: (2023-01-01)
MSCryptoNet: Multi-Scheme Privacy-Preserving Deep Learning in Cloud Computing
by: Owusu-Agyemang Kwabena, et al.
Published: (2019-01-01)
by: Owusu-Agyemang Kwabena, et al.
Published: (2019-01-01)
Toward Bootstrapping-Free Homomorphic Encryption-Based GRU Network for Text Classification
by: Zeyu Wang, et al.
Published: (2024-01-01)
by: Zeyu Wang, et al.
Published: (2024-01-01)
For what algebraic systems does a useful privacy homomorphism exist?
by: Valentina Grazian, et al.
Published: (2025-04-01)
by: Valentina Grazian, et al.
Published: (2025-04-01)
HE-Friendly Algorithm for Privacy-Preserving SVM Training
by: Saerom Park, et al.
Published: (2020-01-01)
by: Saerom Park, et al.
Published: (2020-01-01)
Two-Party Privacy-Preserving Set Intersection with FHE
by: Yunlu Cai, et al.
Published: (2020-11-01)
by: Yunlu Cai, et al.
Published: (2020-11-01)
Efficient Keyset Design for Neural Networks Using Homomorphic Encryption
by: Youyeon Joo, et al.
Published: (2025-07-01)
by: Youyeon Joo, et al.
Published: (2025-07-01)
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks
by: Peng Zhang, et al.
Published: (2024-05-01)
by: Peng Zhang, et al.
Published: (2024-05-01)
Privacy-Preserving Federated Learning Using Homomorphic Encryption
by: Jaehyoung Park, et al.
Published: (2022-01-01)
by: Jaehyoung Park, et al.
Published: (2022-01-01)
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
by: Wencheng Yang, et al.
Published: (2023-03-01)
by: Wencheng Yang, et al.
Published: (2023-03-01)
REED: Chiplet-based Accelerator for Fully Homomorphic Encryption
by: Aikata Aikata, et al.
Published: (2025-03-01)
by: Aikata Aikata, et al.
Published: (2025-03-01)
DARTPHROG: A Superscalar Homomorphic Accelerator
by: Alexander Magyari, et al.
Published: (2025-08-01)
by: Alexander Magyari, et al.
Published: (2025-08-01)
Near-Optimal Polynomial for Modulus Reduction Using L2-Norm for Approximate Homomorphic Encryption
by: Yongwoo Lee, et al.
Published: (2020-01-01)
by: Yongwoo Lee, et al.
Published: (2020-01-01)
A Privacy-Preserving Scheme for a Traffic Accident Risk Level Prediction System
by: Pablo Marcillo, et al.
Published: (2024-10-01)
by: Pablo Marcillo, et al.
Published: (2024-10-01)
A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption
by: Mikhail Babenko, et al.
Published: (2023-04-01)
by: Mikhail Babenko, et al.
Published: (2023-04-01)
Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption
by: Jaehyeok Lee, et al.
Published: (2023-08-01)
by: Jaehyeok Lee, et al.
Published: (2023-08-01)
PPSC: High-Precision and Scalable Encrypted Privacy-Preserving Speech Classification
by: WANG Leilei, SONG Kao, ZHANG Yuanyuan, BI Renwan, XIONG Jinbo
Published: (2025-02-01)
by: WANG Leilei, SONG Kao, ZHANG Yuanyuan, BI Renwan, XIONG Jinbo
Published: (2025-02-01)
Privacy-Preserving Feature Extraction for Medical Images Based on Fully Homomorphic Encryption
by: Junyi Zhang, et al.
Published: (2024-02-01)
by: Junyi Zhang, et al.
Published: (2024-02-01)
Privacy-Preserving Machine Learning (PPML) Inference for Clinically Actionable Models
by: Baris Balaban, et al.
Published: (2025-01-01)
by: Baris Balaban, et al.
Published: (2025-01-01)
Enhancing privacy-preserving brain tumor classification with adaptive reputation-aware federated learning and homomorphic encryption
by: Swetha Ghanta, et al.
Published: (2025-09-01)
by: Swetha Ghanta, et al.
Published: (2025-09-01)
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering
by: Chao Niu, et al.
Published: (2025-09-01)
by: Chao Niu, et al.
Published: (2025-09-01)
Privacy-Preserving Data Sharing in Telehealth Services
by: Ammar Odeh, et al.
Published: (2024-11-01)
by: Ammar Odeh, et al.
Published: (2024-11-01)
Privacy-preserving trajectory similarity computation method
by: Haining YU, et al.
Published: (2022-11-01)
by: Haining YU, et al.
Published: (2022-11-01)
Privacy-preserving trajectory similarity computation method
by: Haining YU, et al.
Published: (2022-11-01)
by: Haining YU, et al.
Published: (2022-11-01)
Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach
by: Vankamamidi S. Naresh, et al.
Published: (2025-02-01)
by: Vankamamidi S. Naresh, et al.
Published: (2025-02-01)
Secure Convolution Neural Network Inference Based on Homomorphic Encryption
by: Chen Song, et al.
Published: (2023-05-01)
by: Chen Song, et al.
Published: (2023-05-01)
Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption
by: William J. Buchanan, et al.
Published: (2025-05-01)
by: William J. Buchanan, et al.
Published: (2025-05-01)
Configurable Arithmetic Core Architecture for RNS-CKKS Homomorphic Encryption
by: Chulwoo Lee, et al.
Published: (2024-01-01)
by: Chulwoo Lee, et al.
Published: (2024-01-01)
A New Perspective on Key Switching for BGV-like Schemes
by: Johannes Mono, et al.
Published: (2025-09-01)
by: Johannes Mono, et al.
Published: (2025-09-01)
Similar Items
-
HEaaN-NB: Non-Interactive Privacy-Preserving Naive Bayes Using CKKS for Secure Outsourced Cloud Computing
by: Boyoung Han, et al.
Published: (2024-01-01) -
EvalRound+ Bootstrapping and Its Rigorous Analysis for CKKS Scheme
by: Hyewon Sung, et al.
Published: (2025-01-01) -
Efficient Homomorphic Integer Computer from CKKS
by: Jaehyung Kim
Published: (2025-09-01) -
Optimal Design of Key Switching Parameters for Efficient CKKS Bootstrapping
by: Sieun Seo, et al.
Published: (2025-01-01) -
Healthcare Privacy-Preserving Federated Transfer Learning using CKKS-Based Homomorphic Encryption and PYHFEL Tool
by: Anmar A. Al-Janabi, et al.
Published: (2024-08-01)
