Discrete logarithm based additively homomorphic encryption and secure data aggregation
From MaRDI portal
Recommendations
- Towards a DL-Based Additively Homomorphic Encryption Scheme
- scientific article; zbMATH DE number 4057442
- Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach
- Bettertimes. Privacy-assured outsourced multiplications for additively homomorphic encryption on finite fields
- Advances in homomorphic cryptosystems
Cites work
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 2204782 (Why is no real title available?)
- A monte carlo method for factorization
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Additively homomorphic encryption with \(d\)-operand multiplications
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption and secure comparison
- New directions in cryptography
- Private Searching on Streaming Data
- Probabilistic encryption
- Public Key Cryptography - PKC 2006
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Threshold cryptography based on Asmuth-Bloom secret sharing
- Towards a DL-Based Additively Homomorphic Encryption Scheme
- Verifiable Rotation of Homomorphic Encryptions
Cited in
(7)- Perfectly secure data aggregation via shifted projections
- Linearly homomorphic encryption from \(\mathsf {DDH}\)
- Homomorphic encryption systems statement: trends and challenges
- A visibility graph averaging aggregation operator
- A secure data forwarding protocol for data statistic services in multi-hop marine sensor networks
- Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain
- Towards a DL-Based Additively Homomorphic Encryption Scheme
This page was built for publication: Discrete logarithm based additively homomorphic encryption and secure data aggregation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q433021)