An improved Fully Homomorphic Encryption model based on N-Primes
暂无分享,去创建一个
[1] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[2] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[3] I-Ling Yen,et al. An Efficient Homomorphic Encryption Protocol for Multi-User Systems , 2012, IACR Cryptol. ePrint Arch..
[4] ContiMauro,et al. A Survey on Homomorphic Encryption Schemes , 2018 .
[5] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[6] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[7] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[8] Kunpeng Wang,et al. Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes , 2019, IEEE Access.
[9] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[10] Said El Hajji,et al. Secure Cloud Computing through Homomorphic Encryption , 2014, ArXiv.
[11] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[12] Chia-Chu Chiang,et al. Parallelizing fully homomorphic encryption for a cloud environment , 2015 .
[13] D. Vasumathi,et al. Homomorphic Encryption Techniques for securing Data in Cloud Computing: A Survey , 2017 .
[14] Jeremy M. Kaplan,et al. Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.
[15] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[16] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[17] Jian Li,et al. A simple fully homomorphic encryption scheme available in cloud computing , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[18] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.