2019
DOI: 10.3390/technologies7010021
|View full text |Cite
|
Sign up to set email alerts
|

A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security

Abstract: Performing smart computations in a context of cloud computing and big data is highly appreciated today. Fully homomorphic encryption (FHE) is a smart category of encryption schemes that allows working with the data in its encrypted form. It permits us to preserve confidentiality of our sensible data and to benefit from cloud computing powers. Currently, it has been demonstrated by many existing schemes that the theory is feasible but the efficiency needs to be dramatically improved in order to make it usable f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…This paper is an extension of our prior works [1], [2], [3]. In these works, we proposed improved cryptographic methods for searching and computation over encrypted data.…”
Section: Contributionmentioning
confidence: 89%
See 1 more Smart Citation
“…This paper is an extension of our prior works [1], [2], [3]. In these works, we proposed improved cryptographic methods for searching and computation over encrypted data.…”
Section: Contributionmentioning
confidence: 89%
“…a noise part is added to cleartexts in order to obtain the homomorphic properties. Most of the work that followed later has inspired from Gentry's framework to design FHE cryptosystems [34], [35], [36], [37], [38], [39],… other ideas and frameworks appeared later [40], [41], [42], [1], [2]… Among the most prominent attempts to simplify homomorphic encryption schemes is the cryptosystem MORE [41]. This latter was the subject of the patent WO2014016795A2.…”
Section: Communication Channels Attacksmentioning
confidence: 99%
“…Garcia and Jacobs (2010) and Gomathisankaran et al (2013) adopted homomorphic encryption (HE). Sensitive data are processed encrypted and there is no information leakage in the process as shown in Figure 6 (El-Yahyaoui and Ech-Cherif El Kettani, 2019). There is an approach to encrypt sensitive areas in images or videos as shown in Figure 7 (Chattopadhyay and Boult, 2007).…”
Section: Privacy-preserving Approaches To Human and Human Activity Recognitionmentioning
confidence: 99%
“…As mentioned before, the verifiability of computational results is an important security guarantee for many outsourced schemes (e.g., [173], [312], and [318]), which checks the correctness of remote computations. In scheme [173], a verification mechanism for matrix multiplication is designed by comparing the values between A(Bv) and Cv at the client (the column vector v is randomly generated by the client).…”
Section: B Verifiabilitymentioning
confidence: 99%