2014
DOI: 10.1007/978-3-662-44774-1_18
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(26 citation statements)
references
References 14 publications
0
26
0
Order By: Relevance
“…This is one of the major cloud issue which should be considered at every phase of designing a cloud architecture (Wang et al 2009;Kamara and Lauter 2010;Mansfield-Devine 2012;Asghar et al 2013;Wang et al 2014a;TCG 2015;Herranz et al 2014;Wang et al 2014b;Coron et al 2014;Smart and Vercauteren 2014;Wang et al 2015a;Halevi and Shoup 2015a;Fujinoki 2015;Hadavi et al 2015;Demmler et al 2015;Roy et al 2015;AlBelooshi et al 2015;Han et al 2015;Xiang et al 2016). There are many types of sensitive information: personal, corporate/governmental financial information, health, biometric information, religious or racial information, sexual orientation, job performance information, collections of surveillance, taking photos/videos in public places, usage data collected from various devices (computers, printers, smart phones), behavioral information (e.g., viewing digital content), visited websites, product usage history, IP addresses, RFID tags, and unique hardware identities.…”
Section: Privacymentioning
confidence: 96%
See 4 more Smart Citations
“…This is one of the major cloud issue which should be considered at every phase of designing a cloud architecture (Wang et al 2009;Kamara and Lauter 2010;Mansfield-Devine 2012;Asghar et al 2013;Wang et al 2014a;TCG 2015;Herranz et al 2014;Wang et al 2014b;Coron et al 2014;Smart and Vercauteren 2014;Wang et al 2015a;Halevi and Shoup 2015a;Fujinoki 2015;Hadavi et al 2015;Demmler et al 2015;Roy et al 2015;AlBelooshi et al 2015;Han et al 2015;Xiang et al 2016). There are many types of sensitive information: personal, corporate/governmental financial information, health, biometric information, religious or racial information, sexual orientation, job performance information, collections of surveillance, taking photos/videos in public places, usage data collected from various devices (computers, printers, smart phones), behavioral information (e.g., viewing digital content), visited websites, product usage history, IP addresses, RFID tags, and unique hardware identities.…”
Section: Privacymentioning
confidence: 96%
“…The CSP does not see what has happened. Although there are significant improvements the existing implementations are unfortunately not yet to be practical in the cloud setting (Rohloff and Cousins 2014;Halevi and Shoup 2015a).…”
Section: Partially Somewhat and Fully Homomorphic Encryption Schemesmentioning
confidence: 98%
See 3 more Smart Citations