2018
DOI: 10.1007/978-3-319-99010-1_34
|View full text |Cite
|
Sign up to set email alerts
|

Fully Homomorphic Encryption with AES in Cloud Computing Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…. Homomorphic encryption uses an encryption function with addition (addition) and or multiplication (multiplication) operations on encrypted data [10].…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
“…. Homomorphic encryption uses an encryption function with addition (addition) and or multiplication (multiplication) operations on encrypted data [10].…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
“…The basic operations that are performed during the round function are AddKey, SubBytes, ShiftRows, and MixColumns [18], [19]. Each AES operation is examined in turn, and how it is implemented homomorphically is described in [20]. The proposed P 2 FHE-AESscheme chose to shoot for an evaluation of AES.…”
Section: B Overview Of Aesmentioning
confidence: 99%
“…It derives its security from hardness of factorizing a large integer [24], which is basis of many public key cryptosystems. As shown in Figure 2, FHE over AES scheme is used to design an efficient and practically feasible FHE that uses AES symmetric algorithm [20]. It can handle arbitrary size of computations without the need of noise management and has scope of parallelization [24], [25].…”
Section: ) Inverse Elementmentioning
confidence: 99%
See 1 more Smart Citation
“…Encryption process must be done on files before storing into the cloud. In addition, authentication in cloud is a very important step which proves that the accessing user is the real user [7][8][9]. Many authentication schemes were proposed to authenticate users in cloud, but a lot of them had some security troubles.…”
Section: Introductionmentioning
confidence: 99%