Secure cloud computing based on threshold homomorphic encryption
From MaRDI portal
Recommendations
Cites work
Cited in
(18)- Secure cloud storage model based on threshold public key encryption and erasure codes over exponents
- Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud
- Minimal basis of the syzygy module of leading terms
- Positional characteristics for efficient number comparison over the homomorphic encryption
- Encrypted data processing with homomorphic re-encryption
- Computing arbitrary functions of encrypted data
- An ANN-based scalable hashing algorithm for computational clouds with schedulers
- Secure set computing in cloud environment
- Practical homomorphic encryption over the integers for secure computation in the cloud
- On the existence of provably secure cloud computing systems
- Outsourcing medical dataset analysis: a possible solution
- On online algorithms for bin, strip, and box packing, and their worst-case and average-case analysis
- Homomorphic cryptosystems and their applications.
- On the deductive security of queries to databases with multi-bit records
- A Cloud Computing Security Model Based on Noninterference
- On the deductive security of queries to confidential databases in cloud computing systems
- Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
- Simulation of a homomorphic encryption system
This page was built for publication: Secure cloud computing based on threshold homomorphic encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2405865)