Improved Cloud-Based N-Primes Model for Symmetric-Based Fully Homomorphic Encryption Using Residue Number System

[1]  Abed Ellatif Samhat,et al.  An Efficient Solution Towards Secure Homomorphic Symmetric Encryption Algorithms , 2019 .

[2]  Nicolas Gama,et al.  Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.

[3]  Smita Agrawal,et al.  Homomorphic Cryptography and Its Applications in Various Domains , 2019 .

[4]  A. Mohammed Multivessel Coronary Artery Disease in Diabetes Mellitus Patients , 2019 .

[5]  Keivan Navi,et al.  A New Moduli Set for Residue Number System in Ternary Valued Logic , 2007 .

[6]  Michael Brenner,et al.  Practical Applications of Homomorphic Encryption , 2012, SECRYPT.

[7]  Yin Hu,et al.  Improving the Efficiency of Homomorphic Encryption Schemes , 2013 .

[8]  Bo Gu,et al.  Reliable Fully Homomorphic Disguising Matrix Computation Outsourcing Scheme , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[9]  Abed Ellatif Samhat,et al.  Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications , 2017, J. Inf. Secur. Appl..

[10]  Kazeem Alagbe Gbolagade,et al.  A New Efficient RNS Reverse Converter for the 4-Moduli Set , 2014 .

[11]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[12]  Frederik Armknecht,et al.  A Guide to Fully Homomorphic Encryption , 2015, IACR Cryptol. ePrint Arch..

[13]  Abed Ellatif Samhat,et al.  Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications , 2017, CRiSIS.

[14]  Nicolas Gama,et al.  Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE , 2017, ASIACRYPT.

[15]  S. Vaudenay,et al.  Cryptanalysis of Chosen Symmetric Homomorphic Schemes , 2015, CRYPTO 2014.

[16]  Frederik Vercauteren,et al.  Overdrive2k: Efficient Secure MPC over $\mathbb {Z}_{2^k}$ from Somewhat Homomorphic Encryption , 2020, CT-RSA.

[17]  Craig Gentry,et al.  Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[18]  Jing Li,et al.  Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings , 2015, IACR Cryptol. ePrint Arch..

[19]  N.P. Gopalan,et al.  Outsourcing Private Cloud Using Symmetric Fully Homomorphic Encryption Using $\boldsymbol{Q^{n}}{_{\boldsymbol{p}}}$ Matrices with Enhanced Access Control , 2018, 2018 International Conference on Inventive Research in Computing Applications (ICIRCA).

[20]  Shuhong Gao Efficient Fully Homomorphic Encryption Scheme , 2018, IACR Cryptol. ePrint Arch..

[21]  Serge Vaudenay,et al.  Cryptanalysis of Enhanced More , 2018 .

[22]  Mohammed Anwar Mohammed,et al.  An improved Fully Homomorphic Encryption model based on N-Primes , 2019, Kurdistan Journal of Applied Research.

[23]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[24]  Claude Turner,et al.  Homomorphic Encryption , 2013, Complex Adaptive Systems.

[25]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[26]  Aviad Kipnis,et al.  Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification , 2012, IACR Cryptol. ePrint Arch..

[27]  P. Steffan,et al.  A comparative study on different moduli sets in residue number system , 2012, 2012 International Conference on Computer Systems and Industrial Informatics.

[28]  Min Liang Symmetric quantum fully homomorphic encryption with perfect security , 2013, Quantum Inf. Process..

[29]  Hyungbo Shim,et al.  Comprehensive Introduction to Fully Homomorphic Encryption for Dynamic Feedback Controller via LWE-based Cryptosystem , 2019, ArXiv.

[30]  Nicolas Gama,et al.  Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping , 2017, IACR Cryptol. ePrint Arch..

[31]  Oleg B. Makarevich,et al.  Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations , 2014, SIN.

[32]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[33]  Damien Stehlé,et al.  Classical hardness of learning with errors , 2013, STOC '13.

[34]  A. Omondi,et al.  Residue Number Systems: Theory and Implementation , 2007 .

[35]  P. Sharma,et al.  Modified RSA Encryption Algorithm (MREA) , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[36]  Zvika Brakerski,et al.  Fundamentals of fully homomorphic encryption , 2019, Providing Sound Foundations for Cryptography.

[37]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.

[38]  Iti Sharma,et al.  A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds , 2013, 2013 Fourth International Conference on the Network of the Future (NoF).

[39]  Léo Ducas,et al.  FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.

[40]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[41]  Mohammad Ubaidullah Bokhari,et al.  A Survey on Cloud Computing , 2018 .

[42]  B. P. S. Sahoo,et al.  Cloud Computing Features, Issues, and Challenges: A Big Picture , 2015, 2015 International Conference on Computational Intelligence and Networks.

[43]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[44]  Chris Peikert,et al.  Hardness of SIS and LWE with Small Parameters , 2013, CRYPTO.

[45]  Vinod Vaikuntanathan,et al.  Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.

[46]  Brent Waters,et al.  Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.

[47]  Madeleine Ekblom Applications of Homomorphic Encryption , 2015 .

[48]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[49]  Yuan Ping,et al.  Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme , 2019, Secur. Commun. Networks.