{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:39:32Z","timestamp":1755693572741,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2019R1A2C4069769"],"award-info":[{"award-number":["2019R1A2C4069769"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2019R1A2C4069769"],"award-info":[{"award-number":["2019R1A2C4069769"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,3,2]]},"abstract":"<jats:p>As a method of privacy-preserving data analysis (PPDA), a fully homomorphic encryption (FHE) has been in the spotlight recently. Unfortunately, because many data analysis methods assume that the type of data is of real type, the FHE-based PPDA methods could not support the enough level of accuracy due to the nature of FHE that fixed-point real-number representation is supported easily. In this paper, we propose a new method to represent encrypted floating-point real numbers on top of FHE. The proposed method is designed to have analogous range and accuracy to 32-bit floating-point number in IEEE 754 representation. We propose a method to perform arithmetic operations and size comparison operations. The proposed method is designed using two different FHEs, HEAAN and TFHE. As a result, HEAAN is proven to be very efficient for arithmetic operations and TFHE is efficient in size comparison. This study is expected to contribute to practical use of FHE-based PPDA.<\/jats:p>","DOI":"10.1155\/2020\/1250295","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T18:30:29Z","timestamp":1583173829000},"page":"1-18","source":"Crossref","is-referenced-by-count":14,"title":["An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE"],"prefix":"10.1155","volume":"2020","author":[{"given":"Subin","family":"Moon","sequence":"first","affiliation":[{"name":"Department of Software Analysis and Design, SeoulTech, Seoul 18011, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1767-6165","authenticated-orcid":true,"given":"Younho","family":"Lee","sequence":"additional","affiliation":[{"name":"ITM Division, Department of Industrial Engineering, SeoulTech, Seoul 18011, Republic of Korea"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2016.03.059"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_25"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"8","first-page":"24","volume-title":"Fully homomorphic encryption over the integers","volume":"6110","year":"2010"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"volume":"8616","volume-title":"Algorithms in HElib","year":"2014","key":"12"},{"issue":"1","key":"15","first-page":"5","volume":"23","year":"1992","journal-title":"ACM Computing Surveys"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2819189"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"20","first-page":"75","volume-title":"Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based","volume":"8042","year":"2013"},{"key":"22","first-page":"144","volume":"2012","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.3745\/jips.04.0034"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2016.2622218"},{"issue":"3","key":"28","first-page":"413","volume":"27","year":"2017","journal-title":"Journal of the Korea Institute of Information Security & Cryptography"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tc.1973.5009159"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_15"},{"key":"31","first-page":"3317","volume":"2","year":"2013","journal-title":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/t-c.1970.223019"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/1250295.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/1250295.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/1250295.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T18:30:32Z","timestamp":1583173832000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/1250295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,2]]},"references-count":21,"alternative-id":["1250295","1250295"],"URL":"https:\/\/doi.org\/10.1155\/2020\/1250295","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,3,2]]}}}