메뉴 건너뛰기




Volumn 7, Issue 1, 2012, Pages 442-447

Overview of homomorphic encryption scheme

Author keywords

Faster fully homomorphic encryption; Fully homomorphic encryption; Ideal lattice; Public key encryption

Indexed keywords

ENCRYPTED DATA; FULLY HOMOMORPHIC ENCRYPTION; HOMOMORPHIC-ENCRYPTIONS; IDEAL LATTICE; PLAINTEXT; PUBLIC-KEY ENCRYPTION;

EID: 84856573536     PISSN: 19759320     EISSN: 22339299     Source Type: Journal    
DOI: 10.4156/jcit.vol7.issue1.52     Document Type: Article
Times cited : (2)

References (9)
  • 2
    • 0030577321 scopus 로고    scopus 로고
    • A new privacy homomorphism and applications
    • J. Domingo-Ferrer, "A new privacy homomorphism and applications", In Information Processing Letters, vol. 60, no. 5, pp. 277-282, 1996.
    • (1996) Information Processing Letters , vol.60 , Issue.5 , pp. 277-282
    • Domingo-Ferrer, J.1
  • 4
    • 78650833995 scopus 로고    scopus 로고
    • Faster Fully Homomorphic Encryption
    • Damien Stehle, Ron Steinfeld, "Faster Fully Homomorphic Encryption", Computer Science, vol. 6477, no.10, pp.377-394, 2010.
    • (2010) Computer Science , vol.6477 , Issue.10 , pp. 377-394
    • Stehle, D.1    Steinfeld, R.2
  • 5
    • 84856582843 scopus 로고    scopus 로고
    • The research of the privacy homomorphic algorithm in database encryption
    • Shi Zhong Pan, Cai Cui Yan, Wang Xianfeng, "The research of the privacy homomorphic algorithm in database encryption", Computer Science, vol.26, no.4, pp.1535-1537, 2009.
    • (2009) Computer Science , vol.26 , Issue.4 , pp. 1535-1537
    • Pan, S.Z.1    Yan, C.C.2    Xianfeng, W.3
  • 7
    • 84856582272 scopus 로고    scopus 로고
    • The research of mobile code security technology based on privacy homomorphism
    • Chen Liang, "The research of mobile code security technology based on privacy homomorphism", South China University of Technology, vol.21, no.13, pp.114-248, 2009.
    • (2009) South China University of Technology , vol.21 , Issue.13 , pp. 114-248
    • Liang, C.1
  • 8
    • 33745165088 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • Dan Boneh, Eu-Jin Goh, and Kobbi Nissim, "Evaluating 2-DNF Formulas on Ciphertexts". TCC, vol.20, no.34, pp.325-341, 2005.
    • (2005) TCC , vol.20 , Issue.34 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 9
    • 77951781415 scopus 로고    scopus 로고
    • A Privacy Manager for Cloud Computing
    • Siani Pearson, Yun Shen, Miranda Mowbray, "A Privacy Manager for Cloud Computing", CloudCom, vol.5, no.12, pp.90-106, 2009.
    • (2009) CloudCom , vol.5 , Issue.12 , pp. 90-106
    • Pearson, S.1    Shen, Y.2    Mowbray, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.