2023
DOI: 10.1186/s13677-023-00425-7
|View full text |Cite
|
Sign up to set email alerts
|

Novel secure data protection scheme using Martino homomorphic encryption

Abstract: Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing technique and security techniques to preserve their data securely from intruders and hackers. Even yet, because of the technology's rapid advancement and inherent insecurity, attackers are conducting assaults on the cloud data. Hence, a homomorphic encryption technique was proposed based on Matrix Transformations with shifts, rotations, and transpositions of Binar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Insecurity, Cloud data attackers [93] Martino Homomorphic encryption (Symmetric), matrix transformations, Shifts, Rotations and Transpositions Provide security against different assaults, Confusion, Diffusion and Avalanche effects were also done and led to the conclusion that the created cipher text is just unbreakable. The suggested approach has a short reaction time.…”
Section: Asymmetric Approach Can Be Used For High Securitymentioning
confidence: 99%
“…Insecurity, Cloud data attackers [93] Martino Homomorphic encryption (Symmetric), matrix transformations, Shifts, Rotations and Transpositions Provide security against different assaults, Confusion, Diffusion and Avalanche effects were also done and led to the conclusion that the created cipher text is just unbreakable. The suggested approach has a short reaction time.…”
Section: Asymmetric Approach Can Be Used For High Securitymentioning
confidence: 99%
“…Homomorphic encryption technology is a method of encryption that allows computations to be directly performed on encrypted data, yielding an encrypted result [23]. This result, when decrypted, is the same as if the same operations had been performed on the original data.…”
Section: Homomorphic Encryptionmentioning
confidence: 99%