Encrypted data processing with homomorphic re-encryption
From MaRDI portal
Publication:2293264
Recommendations
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- Secure cloud computing based on threshold homomorphic encryption
- Computing arbitrary functions of encrypted data
- Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing
- Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
Cites work
- scientific article; zbMATH DE number 1186931 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A scalable scheme for privacy-preserving aggregation of time-series data
- A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
- Batch fully homomorphic encryption over the integers
- Computing arbitrary functions of encrypted data
- Efficient computation outsourcing for inverting a class of homomorphic functions
- Exploring the Feasibility of Fully Homomorphic Encryption
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption with relatively small key and ciphertext sizes
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Cited in
(7)- Homomorphically encrypted \(k\)-means on cloud-hosted servers with low client-side load
- Quantum homomorphic encryption scheme with flexible number of evaluator based on \((k, n)\)-threshold quantum state sharing
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- USST: a two-phase privacy-preserving framework for personalized recommendation with semi-distributed training
- Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives
- A privacy-preserving cryptosystem for IoT E-healthcare
- Simulation of a homomorphic encryption system
This page was built for publication: Encrypted data processing with homomorphic re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2293264)