A systematic review of homomorphic encryption and its contributions in healthcare industry
Abstract Cloud computing and cloud storage have contributed to a big shift in data processing and its use. Availability and accessibility of resources with the reduction of substantial work is one of the main reasons for the cloud revolution. With this cloud computing revolution, outsourcing applica...
| Published in: | Complex & Intelligent Systems |
|---|---|
| Main Authors: | Kundan Munjal, Rekha Bhatia |
| Format: | Article |
| Language: | English |
| Published: |
Springer
2022-05-01
|
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s40747-022-00756-z |
Similar Items
Secure Fully Homomorphic Authenticated Encryption
by: Jeongsu Kim, et al.
Published: (2021-01-01)
by: Jeongsu Kim, et al.
Published: (2021-01-01)
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
by: Kamil Kluczniak, et al.
Published: (2022-11-01)
by: Kamil Kluczniak, et al.
Published: (2022-11-01)
Homomorphic Evaluation Cluster Architecture for Fully Homomorphic Encryption
by: Hanyoung Lee, et al.
Published: (2025-01-01)
by: Hanyoung Lee, et al.
Published: (2025-01-01)
Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption
by: Hong Cheng
Published: (2025-01-01)
by: Hong Cheng
Published: (2025-01-01)
Fully homomorphic encryption scheme from RLWE
by: Dian-hua TANG, et al.
Published: (2014-01-01)
by: Dian-hua TANG, et al.
Published: (2014-01-01)
Fully homomorphic encryption scheme from RLWE
by: Dian-hua TANG, et al.
Published: (2014-01-01)
by: Dian-hua TANG, et al.
Published: (2014-01-01)
Secure Cloud Computing Using Homomorphic Encryption
by: Alexander Olegovich Zhirov, et al.
Published: (2013-02-01)
by: Alexander Olegovich Zhirov, et al.
Published: (2013-02-01)
Design of Fully Homomorphic Encryption by Prime Modular Operation
by: S. Shihab Hamad, et al.
Published: (2018-11-01)
by: S. Shihab Hamad, et al.
Published: (2018-11-01)
Analysis of quantum fully homomorphic encryption schemes (QFHE) and hierarchial memory management for QFHE
by: Shreya Savadatti, et al.
Published: (2025-04-01)
by: Shreya Savadatti, et al.
Published: (2025-04-01)
An overview of torus fully homomorphic encryption
by: Maria Ferrara, et al.
Published: (2023-12-01)
by: Maria Ferrara, et al.
Published: (2023-12-01)
NTRU-type fully homomorphic encryption scheme without key switching
by: Xin-xia SONG, et al.
Published: (2017-01-01)
by: Xin-xia SONG, et al.
Published: (2017-01-01)
Overflow-Detectable Floating-Point Fully Homomorphic Encryption
by: Seunghwan Lee, et al.
Published: (2024-01-01)
by: Seunghwan Lee, et al.
Published: (2024-01-01)
Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
by: Mohammed A. Mohammed, et al.
Published: (2020-12-01)
by: Mohammed A. Mohammed, et al.
Published: (2020-12-01)
Attribute-based fully homomorphic encryption scheme over rings
by: Yong-hui ZHENG, et al.
Published: (2017-04-01)
by: Yong-hui ZHENG, et al.
Published: (2017-04-01)
Attribute-based fully homomorphic encryption scheme over rings
by: Yong-hui ZHENG, et al.
Published: (2017-04-01)
by: Yong-hui ZHENG, et al.
Published: (2017-04-01)
Secure Control of Linear Controllers Using Fully Homomorphic Encryption
by: Jingshan Pan, et al.
Published: (2023-12-01)
by: Jingshan Pan, et al.
Published: (2023-12-01)
Analysis of Modified Shell Sort for Fully Homomorphic Encryption
by: Joon-Woo Lee, et al.
Published: (2021-01-01)
by: Joon-Woo Lee, et al.
Published: (2021-01-01)
Pasta: A Case for Hybrid Homomorphic Encryption
by: Christoph Dobraunig, et al.
Published: (2023-06-01)
by: Christoph Dobraunig, et al.
Published: (2023-06-01)
Modern techniques in somewhat homomorphic encryption
by: Giulietti Massimo, et al.
Published: (2025-04-01)
by: Giulietti Massimo, et al.
Published: (2025-04-01)
Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
by: Juan Luis López Delgado, et al.
Published: (2022-10-01)
by: Juan Luis López Delgado, et al.
Published: (2022-10-01)
MAT-FHE: arbitrary dimension matrix multiplication scheme for floating point over fully homomorphic encryption
by: Yatao Yang, et al.
Published: (2025-07-01)
by: Yatao Yang, et al.
Published: (2025-07-01)
Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme
by: Guangsheng Tu, et al.
Published: (2024-01-01)
by: Guangsheng Tu, et al.
Published: (2024-01-01)
Novel identity-based fully homomorphic encryption scheme from lattice
by: Yong-li TANG, et al.
Published: (2017-05-01)
by: Yong-li TANG, et al.
Published: (2017-05-01)
Novel identity-based fully homomorphic encryption scheme from lattice
by: Yong-li TANG, et al.
Published: (2017-05-01)
by: Yong-li TANG, et al.
Published: (2017-05-01)
A comparative performance analysis of fully homomorphic and attribute-based encryption schemes
by: Kirti Dinkar More, et al.
Published: (2025-10-01)
by: Kirti Dinkar More, et al.
Published: (2025-10-01)
Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis
by: Dongfang Zhao
Published: (2025-06-01)
by: Dongfang Zhao
Published: (2025-06-01)
Identity-Based Matrix (Level) Fully Homomorphic Encryption Scheme
by: CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo
Published: (2020-10-01)
by: CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo
Published: (2020-10-01)
A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption
by: Mikhail Babenko, et al.
Published: (2023-04-01)
by: Mikhail Babenko, et al.
Published: (2023-04-01)
Enhancing Medical Data Privacy: Neural Network Inference with Fully Homomorphic Encryption
by: Maulyanda Maulyanda, et al.
Published: (2025-04-01)
by: Maulyanda Maulyanda, et al.
Published: (2025-04-01)
Verifiable Multi-Keyword Ciphertext Retrieval Scheme Based on Fully Homomorphic Encryption
by: TANG Yingying, CHEN Yuling, LUO Yun, LI Zaidong
Published: (2025-04-01)
by: TANG Yingying, CHEN Yuling, LUO Yun, LI Zaidong
Published: (2025-04-01)
On the Relations between the Attacks on Symmetric Homomorphic Encryption over the Residue Ring
by: Alina V. Trepacheva
Published: (2017-06-01)
by: Alina V. Trepacheva
Published: (2017-06-01)
Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
by: Yuyue Chen, et al.
Published: (2022-08-01)
by: Yuyue Chen, et al.
Published: (2022-08-01)
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods
by: Yanwei Gong, et al.
Published: (2024-03-01)
by: Yanwei Gong, et al.
Published: (2024-03-01)
NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings
by: QIN Xiao-yue, HUANG Ru-wei, YANG Bo
Published: (2022-05-01)
by: QIN Xiao-yue, HUANG Ru-wei, YANG Bo
Published: (2022-05-01)
Evaluating Homomorphic Encryption Schemes for Privacy and Security in Healthcare Data Management
by: Henrique Jorge, et al.
Published: (2025-09-01)
by: Henrique Jorge, et al.
Published: (2025-09-01)
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
by: Ivone Amorim, et al.
Published: (2023-07-01)
by: Ivone Amorim, et al.
Published: (2023-07-01)
SoK: Fully Homomorphic Encryption over the [Discretized] Torus
by: Marc Joye
Published: (2022-08-01)
by: Marc Joye
Published: (2022-08-01)
SoK: Fully Homomorphic Encryption over the [Discretized] Torus
by: Marc Joye
Published: (2022-08-01)
by: Marc Joye
Published: (2022-08-01)
Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error
by: Zahyun Koo, et al.
Published: (2023-01-01)
by: Zahyun Koo, et al.
Published: (2023-01-01)
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
by: HOU Jinqiu, et al.
Published: (2025-03-01)
by: HOU Jinqiu, et al.
Published: (2025-03-01)
Similar Items
-
Secure Fully Homomorphic Authenticated Encryption
by: Jeongsu Kim, et al.
Published: (2021-01-01) -
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
by: Kamil Kluczniak, et al.
Published: (2022-11-01) -
Homomorphic Evaluation Cluster Architecture for Fully Homomorphic Encryption
by: Hanyoung Lee, et al.
Published: (2025-01-01) -
Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption
by: Hong Cheng
Published: (2025-01-01) -
Fully homomorphic encryption scheme from RLWE
by: Dian-hua TANG, et al.
Published: (2014-01-01)
