2013 Fourth International Conference on the Network of the Future (NoF) 2013
DOI: 10.1109/nof.2013.6724526
|View full text |Cite
|
Sign up to set email alerts
|

A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds

Abstract: With single computer's computation power not sufficing, need for sharing resources to manipulate and manage data through clouds is increasing rapidly. Hence, it is favorable to delegate computations or store data with a third party, the cloud provider. However, delegating data to third party poses the risks of data disclosure during computation. The problem can be addressed by carrying out computation without decrypting the encrypted data. The results are also obtained encrypted and can be decrypted at the use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(21 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…Cryptosystems with homomorphic and probabilistic properties are more secure than cryptosystems with only homomorphic property. One of the homomorphic and probabilistic cryptosystems is symmetrical matrix cryptosystem, which are proposed in [27][28]. The matrix homomorphic cryptosystem [28] is presented as follows:…”
Section: Homomorphic Encryption Based On Matrix Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Cryptosystems with homomorphic and probabilistic properties are more secure than cryptosystems with only homomorphic property. One of the homomorphic and probabilistic cryptosystems is symmetrical matrix cryptosystem, which are proposed in [27][28]. The matrix homomorphic cryptosystem [28] is presented as follows:…”
Section: Homomorphic Encryption Based On Matrix Methodsmentioning
confidence: 99%
“…(26) and Eq. (27). The correlation coefficients of four types selected speeches are calculated and tabulated in Table 2.…”
Section: Correlation Of Two Adjacent Samplesmentioning
confidence: 99%
See 2 more Smart Citations
“…Authors in [42,43] emphasized on the need of symmetric FHE schemes because certain applications inherently need secret keys and proposed Fully Homomorphic schemes with symmetric keys based on matrix operations. The time complexity has been claimed to be linear in the security parameter λ.…”
Section: Gupta Et Al (2013 2014 2015)mentioning
confidence: 99%