메뉴 건너뛰기




Volumn 6, Issue 7, 2012, Pages 305-311

Homomorphic encryption and its security application

Author keywords

Homomorphic encryption; Ideal lattice; Privacy protection; Secure multi party computation

Indexed keywords

APPLICATION PROSPECT; CIPHERTEXTS; DATABASE SECURITY; ENCRYPTION SCHEMES; HOMOMORPHIC-ENCRYPTIONS; IDEAL LATTICE; INTERNET OF THINGS (IOT); PRIVACY PROTECTION; PUBLIC KEYS; RESEARCH DIRECTIONS; SECURE MULTI-PARTY COMPUTATION; SECURITY APPLICATION;

EID: 84860126459     PISSN: 19759339     EISSN: 22339310     Source Type: Journal    
DOI: 10.4156/jdcta.vol6.issue7.36     Document Type: Article
Times cited : (5)

References (27)
  • 4
    • 84874800178 scopus 로고
    • A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • T. ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Transactions on Information Theory, vol.31, no.4, pp.10-18, 1985.
    • (1985) IEEE Transactions On Information Theory , vol.31 , Issue.4 , pp. 10-18
    • Elgamal, T.1
  • 5
    • 0032218237 scopus 로고    scopus 로고
    • A New Public-Key Cryptosystem Based on Higher Residues
    • D. Naccache and J. Stern, "A New Public-Key Cryptosystem Based on Higher Residues", In Proceedings of the 5th CCCS, pp.59-66, 1998.
    • (1998) Proceedings of the 5th CCCS , pp. 59-66
    • Naccache, D.1    Stern, J.2
  • 6
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all partial information
    • S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all partial information", In Proc of STOC, vol.28, no.2, pp.365-377, 1982.
    • (1982) Proc of STOC , vol.28 , Issue.2 , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 7
    • 52349113851 scopus 로고    scopus 로고
    • Lattice-based homomorphic encryption of vector spaces
    • C.A. Melchor, G. Castagnos, P. Gaborit, "Lattice-based homomorphic encryption of vector spaces", ISIT, pp. 1858-1862, 2008.
    • (2008) ISIT , pp. 1858-1862
    • Melchor, C.A.1    Castagnos, G.2    Gaborit, P.3
  • 8
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • In: Mitzenmacher M, ed., New York: Association for Computing Machinery
    • Gentry C. Fully homomorphic encryption using ideal lattices. In: Mitzenmacher M, ed. Proc. of the 2009 ACM Int'l Syrup.on Theory of Computing. New York: Association for Computing Machinery, 169-178.2009.
    • (2009) Proc. of the 2009 ACM Int'l Syrup.on Theory of Computing , pp. 169-178
    • Gentry, C.1
  • 9
    • 0036324209 scopus 로고    scopus 로고
    • Database technology in digital libraries
    • Preston Carole, Lin Binshan, "Database technology in digital libraries", Information Services and Use, vol.22, no.1, pp.9-17, 2002.
    • (2002) Information Services and Use , vol.22 , Issue.1 , pp. 9-17
    • Carole, P.1    Binshan, L.2
  • 10
    • 84860170099 scopus 로고    scopus 로고
    • Overview of database encryption and ciphertext query techniques
    • Zhu Qin, Luo Yizhu, Le Jiajing, "Overview of database encryption and ciphertext query techniques", Journal of Donghua University (Natural Science), vol.33, no.4, pp.543-548, 2007.
    • (2007) Journal of Donghua University (Natural Science) , vol.33 , Issue.4 , pp. 543-548
    • Qin, Z.1    Yizhu, L.2    Le, J.3
  • 12
    • 13944282904 scopus 로고    scopus 로고
    • Research on privacy homomorphic technique and the implementation of its algorithm
    • Yang Yong, Fang Yong, Zhou Anming, "Research on privacy homomorphic technique and the implementation of its algorithm", Computer Engineering, vol.31, no.2, pp.157-159, 2005.
    • (2005) Computer Engineering , vol.31 , Issue.2 , pp. 157-159
    • Yong, Y.1    Yong, F.2    Anming, Z.3
  • 16
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • Fagin R, Naor M, Winkler P, "Comparing information without leaking it", Communications of the ACM, vol.39, no.5, pp.77-85, 1996.
    • (1996) Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 17
    • 66349131521 scopus 로고    scopus 로고
    • A protocol of specific secure two-party computation
    • Qin Jing, Zhang Zhenfeng, Feng Dengguo, Li Bao, "A protocol of specific secure two-party computation", Journal on Communications, vol.25, no.11, pp.39-46, 2004.
    • (2004) Journal On Communications , vol.25 , Issue.11 , pp. 39-46
    • Jing, Q.1    Zhenfeng, Z.2    Dengguo, F.3    Li, B.4
  • 18
    • 22844441340 scopus 로고    scopus 로고
    • An efficient solution to Yao's millionaires'problem
    • Li Shundong, Dai Yiqi, You Qiyou, "An efficient solution to Yao's millionaires'problem", Asta Sinica Electronica, vol.33, no.5, pp.769-773, 2005.
    • (2005) Asta Sinica Electronica , vol.33 , Issue.5 , pp. 769-773
    • Li, S.1    Yiqi, D.2    Qiyou, Y.3
  • 19
    • 84860139271 scopus 로고    scopus 로고
    • The use of RSA cryptosystem to solve secure multi-party multi-data sorting problem
    • Qiu Mei, Luo Shoushan, Liu Wen, Chen Ping, "The use of RSA cryptosystem to solve secure multi-party multi-data sorting problem", Asta Sinica Electronica, vol.37, no.5, pp.1119-1123, 2009.
    • (2009) Asta Sinica Electronica , vol.37 , Issue.5 , pp. 1119-1123
    • Mei, Q.1    Shoushan, L.2    Wen, L.3    Ping, C.4
  • 20
    • 84860204691 scopus 로고    scopus 로고
    • The use of ElGamal cryptosystem to solve secure multi-party multi-data sorting problem
    • Liu Wen, Luo Shoushan, Chen Ping, "The use of ElGamal cryptosystem to solve secure multi-party multi-data sorting problem", Journal on Communications, vol.28, no.11, pp.1-5, 2007.
    • (2007) Journal On Communications , vol.28 , Issue.11 , pp. 1-5
    • Wen, L.1    Shoushan, L.2    Ping, C.3
  • 22
    • 84860192036 scopus 로고    scopus 로고
    • Shanghai: Shanghai Jiao Tong University, China
    • Li Feng, "Privacy for data mining method", Shanghai: Shanghai Jiao Tong University, China, 2008.
    • Privacy For Data Mining Method , pp. 2008
    • Li, F.1
  • 24
    • 78349288691 scopus 로고    scopus 로고
    • Constructing Secure Content-Dependent Watermarking Scheme Using Homomorphic Encryption
    • Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun, "Constructing Secure Content-Dependent Watermarking Scheme Using Homomorphic Encryption", IEEE,vol.7, no.7, pp.627-630, 2007.
    • (2007) IEEE , vol.7 , Issue.7 , pp. 627-630
    • Li, Z.1    Zhu, X.2    Lian, Y.3    Sun, Q.4
  • 25
    • 84860182048 scopus 로고    scopus 로고
    • The encrypted storage and retrieval technology of cloud storage application
    • Huang Yongfeng, Zhang Jiuling, Li Xing, "The encrypted storage and retrieval technology of cloud storage application", ZTE Technologies, vol.16, no.4, pp.33-35, 2010.
    • (2010) ZTE Technologies , vol.16 , Issue.4 , pp. 33-35
    • Yongfeng, H.1    Jiuling, Z.2    Li, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.