Fully homomorphic encryption in real world applications
DOI10.1007/978-981-13-6393-1zbMATH Open1443.68006OpenAlexW2945797899MaRDI QIDQ2188373FDOQ2188373
Authors: Ayantika Chatterjee, Khin Mi Mi Aung
Publication date: 10 June 2020
Published in: Computer Architecture and Design Methodologies (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-981-13-6393-1
Recommendations
- Homomorphic encryption and applications
- Multikey fully homomorphic encryption and applications
- Exploring the Feasibility of Fully Homomorphic Encryption
- Somewhat/fully homomorphic encryption: implementation progresses and challenges
- Fully homomorphic encryption over the integers
- Verifiable Decryption for Fully Homomorphic Encryption
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption
- Fully homomorphic encryption for mathematicians
- Fully homomorphic encryption with relatively small key and ciphertext sizes
Research exposition (monographs, survey articles) pertaining to computer science (68-02) Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25) Searching and sorting (68P10) Database theory (68P15)
Cited In (7)
- Lattice-based public-key cryptography in hardware
- Encrypted SQL arithmetic functions processing for secure cloud database
- Searchable Encryption
- Hedging public-key encryption in the real world
- Protecting privacy through homomorphic encryption. Based on 6 workshops on homomorphic encryption standardization
- Encryption scheduling for remote state estimation under an operation constraint
- Homomorphic encryption and applications
This page was built for publication: Fully homomorphic encryption in real world applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2188373)