2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) 2017
DOI: 10.1109/iceeccot.2017.8284566
|View full text |Cite
|
Sign up to set email alerts
|

Comparative study of homomorphic encryption methods for secured data operations in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…HE enables an application to perform a computation on encrypted data without decrypting the cipher text. This type of encryption allows the delivery of a cipher text C.M / of a plaintext message M and performs the computation on cipher text C.f .M // function on a plaintext message M without decrypting the message M [18,28] . This encryption process proceeds in three steps:…”
Section: Hementioning
confidence: 99%
“…HE enables an application to perform a computation on encrypted data without decrypting the cipher text. This type of encryption allows the delivery of a cipher text C.M / of a plaintext message M and performs the computation on cipher text C.f .M // function on a plaintext message M without decrypting the message M [18,28] . This encryption process proceeds in three steps:…”
Section: Hementioning
confidence: 99%
“…Away from standard data protection schemes, to improve the performance of encryption, compression and steganography schemes an efficient approach is presented in [8]. The performance of various security schemes are analyzed and compared with the performance of RSA, MD5 and SHA1 approaches [9]. A combined approach is presented in [10], which clubs Byte rotation and ABE schemes to improve performance in peer to peer networks.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, some encryption algorithms are not applicable for computing ciphertext directly in cloud computing platform. On the contrary, homomorphic encryption can execute operations of ciphertext directly, which called the feature as algebraic homomorphism [16]- [18]. However, as the high computational complexity of homomorphic encryption, many scholars concentrate on how to improve the execution efficiency for sake of the popularity of the cloud computing platform [19].…”
Section: Related Workmentioning
confidence: 99%