Symmetric-Key Homomorphic Encryption for Encrypted Data Processing

作者: A. C.-F. Chan

DOI: 10.1109/ICC.2009.5199505

关键词:

摘要: … ciphertext is usually the one who does its encryption. In this paper, we work on how to process encrypted data without any loss of data confidentiality. An example is a small company, …

参考文章(13)
Yacov Yacobi, Ernest F. Brickell, On privacy homomorphisms theory and application of cryptographic techniques. pp. 117- 125 ,(1987)
Ronald L Rivest, Len Adleman, Michael L Dertouzos, ON DATA BANKS AND PRIVACY HOMOMORPHISMS ,(1978)
Tomas Sander, Christian F. Tschudin, On Software Protection via Function Hiding information hiding. pp. 111- 123 ,(1998) , 10.1007/3-540-49380-8_9
T. Sander, C.F. Tschudin, Towards mobile cryptography ieee symposium on security and privacy. pp. 215- 224 ,(1998) , 10.1109/SECPRI.1998.674837
Niv Ahituv, Yeheskel Lapid, Seev Neumann, Processing encrypted data Communications of The ACM. ,vol. 30, pp. 777- 780 ,(1987) , 10.1145/30401.30404
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Andrew C. Yao, Protocols for secure computations foundations of computer science. pp. 160- 164 ,(1982) , 10.1109/SFCS.1982.88
Taher ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms international cryptology conference. ,vol. 31, pp. 10- 18 ,(1985) , 10.1109/TIT.1985.1057074
Douglas R. Stinson, Cryptography: Theory and Practice ,(1995)
Pascal Paillier, Public-key cryptosystems based on composite degree residuosity classes theory and application of cryptographic techniques. pp. 223- 238 ,(1999) , 10.1007/3-540-48910-X_16