2018
DOI: 10.5121/acij.2018.9601
|View full text |Cite
|
Sign up to set email alerts
|

Secure Outsourced Calculations with Homomorphic Encryption

Abstract: With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these encrypted data without disclosing any useful information, and to achieve the rights management efficiently. In this paper, we propose the encrypted data process… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The rapid development of Big Data [10] more and more users decide to outsource their data to the Big Data for warehousing and further outgrowth. [5] The homomorphic encryption phase is semantically secure, like RSA, also have attacks on one way.…”
Section: Related Workmentioning
confidence: 99%
“…The rapid development of Big Data [10] more and more users decide to outsource their data to the Big Data for warehousing and further outgrowth. [5] The homomorphic encryption phase is semantically secure, like RSA, also have attacks on one way.…”
Section: Related Workmentioning
confidence: 99%
“…Authors in [12] discussed the enhanced FHE with a focus on the dynamic structure of Fully HESs that are symmetric in nature. Regarding secure outsourced calculations using HE, the authors in [13] discussed the encrypted data processing protocols by applying HE over addition and proxy cryptography. Their system aimed to attain the secrecy of the user data while preserving the intermediary and final results security under the semi-honest model.…”
Section: Introductionmentioning
confidence: 99%
“…It avoids the encryption process on the plain text, which forces the decryption process, which prolongs the steps. Homomorphic encryption result is the same with encryption to plaintext [3]. It allows safe data storage in the database in the form of ciphertext, and it achieves a faster processing time compared to the use of regular cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%