메뉴 건너뛰기




Volumn 4, Issue 1, 2009, Pages 86-97

On the implementation of the discrete fourier transform in the encrypted domain

Author keywords

Discrete Fourier transform (DFT); Error analysis; Fast Fourier transform (FFT); Homomorphic encryption; Secure signal processing; Signal processing in the encrypted domain; Signal representation

Indexed keywords

BLOCK CODES; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; DISCRETE FOURIER TRANSFORMS; ERROR ANALYSIS; ERRORS; FAST FOURIER TRANSFORMS; IMAGE QUALITY; OBJECT RECOGNITION; PROBABILITY DENSITY FUNCTION; SIGNAL PROCESSING;

EID: 60449095773     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.2011087     Document Type: Article
Times cited : (138)

References (24)
  • 2
    • 60449097613 scopus 로고    scopus 로고
    • R. Rivest, L. Adleman, and M. Dertouzos, On data banks and privacy homomorphisms, in Foundations of Secure Computation, R. DeMillo, Ed. et al. London, U.K.: Academic, 1978, pp. 169-179.
    • R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation, R. DeMillo, Ed. et al. London, U.K.: Academic, 1978, pp. 169-179.
  • 3
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
    • (1984) J. Comput. Syst. Sci , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 6
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Notes Comput. Sci. New York: Springer
    • R. Cramer, I. Damgård, and J. B. Nielsen, "Multiparty computation from threshold homomorphic encryption," in, ser. Lect. Notes Comput. Sci. New York: Springer, 2001, vol. 2045, pp. 280-300.
    • (2001) ser. Lect , vol.2045 , pp. 280-300
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 7
    • 33746092442 scopus 로고    scopus 로고
    • B. Schoenmakers and P. Tuyls, Efficient binary conversion for Paillier encrypted values, in Proc. Eurocrypt: Advances in Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2006, 4004, pp. 522-537.
    • B. Schoenmakers and P. Tuyls, "Efficient binary conversion for Paillier encrypted values," in Proc. Eurocrypt: Advances in Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2006, vol. 4004, pp. 522-537.
  • 8
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • Apr
    • N. Memon and P. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
    • (2001) IEEE Trans. Image Process , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.1    Wong, P.2
  • 9
    • 9744242854 scopus 로고    scopus 로고
    • An efficient and anonymous buyer-seller watermarking protocol
    • Dec
    • C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 13, no. 12, pp. 1618-1626, Dec. 2004.
    • (2004) IEEE Trans. Image Process , vol.13 , Issue.12 , pp. 1618-1626
    • Lei, C.-L.1    Yu, P.-L.2    Tsai, P.-L.3    Chan, M.-H.4
  • 10
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • Dec
    • M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Processing, vol. 14, no. 12, pp. 2129-2139, Dec. 2005.
    • (2005) IEEE Trans. Image Processing , vol.14 , Issue.12 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 11
    • 84942550998 scopus 로고    scopus 로고
    • P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Proc. Eurocrypt: Advances in Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer-Verlag, 1999, 1592, pp. 223-238.
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Eurocrypt: Advances in Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer-Verlag, 1999, vol. 1592, pp. 223-238.
  • 12
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • I. Damgârd and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in Public Key Cryptography, 2001, pp. 119-136.
    • (2001) Public Key Cryptography , pp. 119-136
    • Damgârd, I.1    Jurik, M.2
  • 17
    • 0014522322 scopus 로고
    • A fixed-point fast Fourier transform error analysis
    • Jun
    • P. D. Welch, "A fixed-point fast Fourier transform error analysis," IEEE Trans. Audio Electroacoust., vol. AU-17, no. 2, pp. 151-157, Jun. 1969.
    • (1969) IEEE Trans. Audio Electroacoust , vol.AU-17 , Issue.2 , pp. 151-157
    • Welch, P.D.1
  • 18
    • 33846236688 scopus 로고
    • Effects of finite register length in digital filtering and the fast Fourier transform
    • Aug
    • A. V. Oppenheim and C. J. Weinstein, "Effects of finite register length in digital filtering and the fast Fourier transform," Proc. IEEE, vol. 60, no. 8, pp. 957-976, Aug. 1972.
    • (1972) Proc. IEEE , vol.60 , Issue.8 , pp. 957-976
    • Oppenheim, A.V.1    Weinstein, C.J.2
  • 19
    • 0016518798 scopus 로고
    • Quantization errors in the fast Fourier transform
    • Jun
    • D. V. James, "Quantization errors in the fast Fourier transform," IEEE Trans. Acoust., Speech, Signal Process., vol. ASSP-23, no. 3, pp. 277-283, Jun. 1975.
    • (1975) IEEE Trans. Acoust., Speech, Signal Process , vol.ASSP-23 , Issue.3 , pp. 277-283
    • James, D.V.1
  • 20
    • 0034215495 scopus 로고    scopus 로고
    • The Montgomery modular inverse-Revisited
    • Jul
    • E. Savas and Ç. K. Koç, "The Montgomery modular inverse-Revisited," IEEE Trans. Comput., vol. 49, no. 7, pp. 763-766, Jul. 2000.
    • (2000) IEEE Trans. Comput , vol.49 , Issue.7 , pp. 763-766
    • Savas, E.1    Koç, C.K.2
  • 21
    • 13244286640 scopus 로고    scopus 로고
    • A hardware algorithm for modular multiplication/division
    • Jan
    • M. E. Kaihara and N. Takagi, "A hardware algorithm for modular multiplication/division," IEEE Trans. Comput., vol. 54, no. 1, pp. 12-21, Jan. 2005.
    • (2005) IEEE Trans. Comput , vol.54 , Issue.1 , pp. 12-21
    • Kaihara, M.E.1    Takagi, N.2
  • 22
    • 0030172012 scopus 로고    scopus 로고
    • Analyzing and comparing Montgomery multiplication algorithms
    • Jun
    • Ç. K. Koç, T. Acar, and B. S. Kalinski, "Analyzing and comparing Montgomery multiplication algorithms," IEEE Micro, vol. 16, no. 3, pp. 26-33, Jun. 1996.
    • (1996) IEEE Micro , vol.16 , Issue.3 , pp. 26-33
    • Koç, C.K.1    Acar, T.2    Kalinski, B.S.3
  • 23
    • 0029358884 scopus 로고
    • The Montgomery inverse and its applications
    • Aug
    • B. S. Kalinski, "The Montgomery inverse and its applications," IEEE Trans. Comput., vol. 44, no. 8, pp. 1064-1065, Aug. 1995.
    • (1995) IEEE Trans. Comput , vol.44 , Issue.8 , pp. 1064-1065
    • Kalinski, B.S.1
  • 24
    • 60449085988 scopus 로고    scopus 로고
    • D. E. Knuth, The Art of Computer Programming, 3rd: Seminumerical algorithms ed. Reading, MA: Addison-Wesley Longman, 1997, 2.
    • D. E. Knuth, The Art of Computer Programming, 3rd: Seminumerical algorithms ed. Reading, MA: Addison-Wesley Longman, 1997, vol. 2.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.