Encrypted data processing with homomorphic re-encryption
From MaRDI portal
Publication:2293264
DOI10.1016/J.INS.2017.05.004zbMATH Open1429.68060OpenAlexW2610479618WikidataQ121461726 ScholiaQ121461726MaRDI QIDQ2293264FDOQ2293264
Authors: Wenxiu Ding, Zheng Yan, Robert H. Deng
Publication date: 7 February 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://ink.library.smu.edu.sg/sis_research/3676
Recommendations
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- Secure cloud computing based on threshold homomorphic encryption
- Computing arbitrary functions of encrypted data
- Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing
- Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
cloud computingaccess controlhomomorphic encryptionprivacy preservationproxy re-encryptiondata sharing
Cites Work
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- (Leveled) fully homomorphic encryption without bootstrapping
- Fully homomorphic encryption with relatively small key and ciphertext sizes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- A scalable scheme for privacy-preserving aggregation of time-series data
- Improved proxy re-encryption schemes with applications to secure distributed storage
- A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
- Computing arbitrary functions of encrypted data
- Batch fully homomorphic encryption over the integers
- Efficient computation outsourcing for inverting a class of homomorphic functions
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- Exploring the Feasibility of Fully Homomorphic Encryption
Cited In (7)
- Homomorphically encrypted \(k\)-means on cloud-hosted servers with low client-side load
- Quantum homomorphic encryption scheme with flexible number of evaluator based on \((k, n)\)-threshold quantum state sharing
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- USST: a two-phase privacy-preserving framework for personalized recommendation with semi-distributed training
- Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives
- A privacy-preserving cryptosystem for IoT E-healthcare
- Simulation of a homomorphic encryption system
This page was built for publication: Encrypted data processing with homomorphic re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2293264)