Discrete logarithm based additively homomorphic encryption and secure data aggregation (Q433021): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 5 users not shown)
Property / author
 
Property / author: Li-Cheng Wang / rank
Normal rank
 
Property / author
 
Property / author: Li-hua Wang / rank
Normal rank
 
Property / author
 
Property / author: Yi-Xian Yang / rank
Normal rank
 
Property / author
 
Property / author: Li-Cheng Wang / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2011.04.002 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2158001192 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards a DL-Based Additively Homomorphic Encryption Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic encryption and secure comparison / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verifiable Rotation of Homomorphic Encryptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold cryptography based on Asmuth-Bloom secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Additively Homomorphic Encryption with d-Operand Multiplications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Searching on Streaming Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: A monte carlo method for factorization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5316395 / rank
 
Normal rank

Latest revision as of 11:48, 5 July 2024

scientific article
Language Label Description Also known as
English
Discrete logarithm based additively homomorphic encryption and secure data aggregation
scientific article

    Statements

    Discrete logarithm based additively homomorphic encryption and secure data aggregation (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    13 July 2012
    0 references
    0 references
    homomorphic encryption
    0 references
    discrete logarithm problem
    0 references
    wireless sensor networks
    0 references
    secure data aggregation
    0 references
    0 references