2007
DOI: 10.1186/1687-417x-2007-013801
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Homomorphic Encryption for Nonspecialists

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
91
0
2

Year Published

2008
2008
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 126 publications
(105 citation statements)
references
References 0 publications
0
91
0
2
Order By: Relevance
“…The highest security level, unconditional security is only reached by the One-Time Pad, and cannot be achieved here because it would require to use a different key for each encryption whereas here the same key k S is used to encrypt all the keys K i . Hence, semantic security is the best security class we might achieve [9,20,7]. Moreover, semantic security is necessary in our case, because we have to encrypt binary symbols and do not want the Receiver to be able to distinguish encrypted 0's from encrypted 1's during both the fingerprint generation or the halfword disclosure steps.…”
Section: Details Of the Oblivious Transfer Protocolmentioning
confidence: 99%
“…The highest security level, unconditional security is only reached by the One-Time Pad, and cannot be achieved here because it would require to use a different key for each encryption whereas here the same key k S is used to encrypt all the keys K i . Hence, semantic security is the best security class we might achieve [9,20,7]. Moreover, semantic security is necessary in our case, because we have to encrypt binary symbols and do not want the Receiver to be able to distinguish encrypted 0's from encrypted 1's during both the fingerprint generation or the halfword disclosure steps.…”
Section: Details Of the Oblivious Transfer Protocolmentioning
confidence: 99%
“…Further, both protocols require to employ deterministic cryptosystems. Unfortunately, all efficient privacy homomorphic cryptosystems are probabilistic (Fontaine & Galand, 2007), and both protocols require a privacy homomorphism for watermark insertion in the encrypted domain. In this regard, we can prove that both protocols are not…”
Section: Our Approachmentioning
confidence: 99%
“…Furthermore, the outsourced data set is obfuscated by introducing fake profiles, which eliminates the correlation of original data set statistics with the statistics of the obfuscated data set used in the cloud server. Encryption: The demographic information (e.g., age, gender, occupation) about subscribers is encrypted via homomorphic encryption techniques [19] so that the cloud server can perform calculations directly over the encrypted data without decrypting it. Aggregate data release: In case background information about the subscribers is available, the server returns only aggregate information on the set of matching subscriber profiles, in which sensitive information is sufficiently diverse.…”
Section: Contributionsmentioning
confidence: 99%