Using Fully Homomorphic Encryption to Secure Cloud Computing
暂无分享,去创建一个
[1] Aderemi A. Atayero,et al. Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption , 2011 .
[2] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[3] S. Hemalatha,et al. Performance of Ring Based Fully Homomorphic Encryption for securing data in Cloud Computing , 2014 .
[4] Cheng Xin-meng,et al. A method of homomorphic encryption , 2008, Wuhan University Journal of Natural Sciences.
[5] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[6] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[7] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[8] Yan Zhang,et al. A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.
[9] Jaydip Sen,et al. Homomorphic Encryption — Theory and Application , 2013 .
[10] Victor I. Chang,et al. Secure searching on cloud storage enhanced by homomorphic indexing , 2016, Future Gener. Comput. Syst..
[11] Jian Li,et al. A simple fully homomorphic encryption scheme available in cloud computing , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[12] Na Zhao,et al. Fully homomorphic encryption application in cloud computing , 2014, 2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP).
[13] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[14] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[15] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[16] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[17] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[18] Tolga Soyata,et al. Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[19] Said El Hajji,et al. Secure Cloud Computing through Homomorphic Encryption , 2014, ArXiv.
[20] Brian Hayes. Alice and Bob in Cipherspace , 2012 .
[21] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[22] Christoph Meinel,et al. Processing Over Encrypted Data: Between Theory and Practice , 2016, SGMD.