2022
DOI: 10.1016/j.jksuci.2020.09.003
|View full text |Cite
|
Sign up to set email alerts
|

Provable Data Possession using Additive Homomorphic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 12 publications
0
0
0
Order By: Relevance
“…This result, when decrypted, is the same as if the same operations had been performed on the original data. This technology has long been a research hotspot in the fields of cryptography and data security [24,25].…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…This result, when decrypted, is the same as if the same operations had been performed on the original data. This technology has long been a research hotspot in the fields of cryptography and data security [24,25].…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
“…After numerous experiments, it can be concluded that when r ≈ 2 √ η , q ≈ 2 η 3 , the system exhibits better stability and the encryption effect is also optimal. Byte(q)∈[220, 2077) Byte(q)∈[2077, 7388) Byte(q)∈[7388, 25,807) Byte(q)∈ [25,807,65,443) Figure 8. The effect of Byte(q) on the accuracy for η = 9.…”
Section: Impact Factor For Pdphe (Rq3)mentioning
confidence: 99%