2021
DOI: 10.21123/bsj.2021.18.2(suppl.).0899
|View full text |Cite
|
Sign up to set email alerts
|

A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code

Abstract: Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…The output of these computations was also encrypted in [17]. It became a common method to secure data in the cloud [18].…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
“…The output of these computations was also encrypted in [17]. It became a common method to secure data in the cloud [18].…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
“…Concurrently, the Vigenère cipher, known for its encryption strength, guards message confidentiality. Performance enhancements with respect to this aspect would involve evaluating the algorithm's processing speed and resource utilization to gauge its contribution to the system's overall performance improvements discerption regarding the reference [21][22][23] .…”
Section: Figure 3 Proposed Algorithmmentioning
confidence: 99%
“…Challa et al 26 suggested a modified Reed-Muller Code-based symmetric key fully homomorphic encryption that enables both (MOD 2) additive and multiplication operations limitlessly. The proof of security provides a mathematical analysis and difficulty level.…”
Section: Related Workmentioning
confidence: 99%