期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption
1
作者 Zhen Wang Qiu-yu Zhang +1 位作者 Ling-tao Meng Yi-lin Liu 《Computers, Materials & Continua》 SCIE EI 2023年第6期6161-6184,共24页
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep ha... To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure,searchable encryption scheme.First,a deep learning framework based on residual network and transfer learn-ing model is designed to extract more representative image deep features.Secondly,the central similarity is used to quantify and construct the deep hash sequence of features.The Paillier homomorphic encryption encrypts the deep hash sequence to build a high-security and low-complexity searchable index.Finally,according to the additive homomorphic property of Paillier homomorphic encryption,a similarity measurement method suitable for com-puting in the retrieval system’s security is ensured by the encrypted domain.The experimental results,which were obtained on Web Image Database from the National University of Singapore(NUS-WIDE),Microsoft Common Objects in Context(MS COCO),and ImageNet data sets,demonstrate the system’s robust security and precise retrieval,the proposed scheme can achieve efficient image retrieval without revealing user privacy.The retrieval accuracy is improved by at least 37%compared to traditional hashing schemes.At the same time,the retrieval time is saved by at least 9.7%compared to the latest deep hashing schemes. 展开更多
关键词 Content-based image retrieval deep supervised hashing central similarity quantification searchable encryption paillier homomorphic encryption
下载PDF
KPH:A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment
2
作者 Yang Li Mengmeng Wang +1 位作者 Jianming Zhu Xiuli Wang 《国际计算机前沿大会会议论文集》 2022年第2期92-104,共13页
Blockchain is a shared database with excellent characteristics,such as high decentralization and traceability.However,data leakage is still a major problem for blockchain transactions.To address this issue,this work i... Blockchain is a shared database with excellent characteristics,such as high decentralization and traceability.However,data leakage is still a major problem for blockchain transactions.To address this issue,this work introduces KPH(Paillier Homomorphic Encryption with Variable k),a privacy protection strategy that updates the transaction amount using the enhanced Paillier semihomomorphic encryption algorithm and verifies the transaction using the FO commitment.Unlike the typical Paillier algorithm,theKPHscheme’s Paillier algorithm includes a variable k and combines the L function and the Chinese remainder theorem to reduce the time complexity of the algorithm from O(|n|2+e)to O(logn),making the decryption process more efficient. 展开更多
关键词 Blockchain paillier homomorphic encryption Chinese remainder theorem FO commitment
原文传递
An Improved LeNet-5 Model Based on Encrypted Data
3
作者 Huanhuan Ni Yiliang Han +1 位作者 Xiaowei Duan Guohui Yang 《国际计算机前沿大会会议论文集》 2021年第2期166-178,共13页
In recent years,the problem of privacy leakage has attracted increasing attentions.Therefore,machine learning privacy protection becomes crucial research topic.In this paper,the Paillier homomorphic encryption algorit... In recent years,the problem of privacy leakage has attracted increasing attentions.Therefore,machine learning privacy protection becomes crucial research topic.In this paper,the Paillier homomorphic encryption algorithm is proposed to protect the privacy data.The original LeNet-5 convolutional neural network model was first improved.Then the activation function was modified and the C5 layer was removed to reduce the number of model parameters and improve the operation efficiency.Finally,by mapping the operation of each layer in the convolutional neural network from the plaintext domain to the ciphertext domain,an improved LeNet-5 model that can run on encrypted data was constructed.The purpose of using machine learning algorithmwas realized and privacywas ensured at the same time.The analysis shows that the model is feasible and the efficiency is improved. 展开更多
关键词 paillier homomorphic encryption LeNet-5 model Convolutional neural network Privacy protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部