-
1
-
-
33746327374
-
-
Academic Press, USA
-
R. Rivest, L. Adleman, M. Dertouzos, "On data banks and privacy homomorphism", Foundations of Secure Computation, Academic Press, USA, 1978.
-
(1978)
On Data Banks and Privacy Homomorphism", Foundations of Secure Computation
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
2
-
-
0030577321
-
A new privacy homomorphism and applications
-
Domingo-ferrer J, Herrera-Joancomarti J, "A new privacy homomorphism and applications", Information Processing Letters, vol.60, no.5, pp.277-282, 1996.
-
(1996)
Information Processing Letters
, vol.60
, Issue.5
, pp. 277-282
-
-
Domingo-Ferrer, J.1
Herrera-Joancomarti, J.2
-
4
-
-
84874800178
-
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Transactions on Information Theory, vol.31, no.4, pp.10-18, 1985.
-
(1985)
IEEE Transactions On Information Theory
, vol.31
, Issue.4
, pp. 10-18
-
-
Elgamal, T.1
-
5
-
-
0032218237
-
A New Public-Key Cryptosystem Based on Higher Residues
-
D. Naccache and J. Stern, "A New Public-Key Cryptosystem Based on Higher Residues", In Proceedings of the 5th CCCS, pp.59-66, 1998.
-
(1998)
Proceedings of the 5th CCCS
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
6
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all partial information
-
S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all partial information", In Proc of STOC, vol.28, no.2, pp.365-377, 1982.
-
(1982)
Proc of STOC
, vol.28
, Issue.2
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
7
-
-
52349113851
-
Lattice-based homomorphic encryption of vector spaces
-
C.A. Melchor, G. Castagnos, P. Gaborit, "Lattice-based homomorphic encryption of vector spaces", ISIT, pp. 1858-1862, 2008.
-
(2008)
ISIT
, pp. 1858-1862
-
-
Melchor, C.A.1
Castagnos, G.2
Gaborit, P.3
-
8
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
In: Mitzenmacher M, ed., New York: Association for Computing Machinery
-
Gentry C. Fully homomorphic encryption using ideal lattices. In: Mitzenmacher M, ed. Proc. of the 2009 ACM Int'l Syrup.on Theory of Computing. New York: Association for Computing Machinery, 169-178.2009.
-
(2009)
Proc. of the 2009 ACM Int'l Syrup.on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
9
-
-
0036324209
-
Database technology in digital libraries
-
Preston Carole, Lin Binshan, "Database technology in digital libraries", Information Services and Use, vol.22, no.1, pp.9-17, 2002.
-
(2002)
Information Services and Use
, vol.22
, Issue.1
, pp. 9-17
-
-
Carole, P.1
Binshan, L.2
-
10
-
-
84860170099
-
Overview of database encryption and ciphertext query techniques
-
Zhu Qin, Luo Yizhu, Le Jiajing, "Overview of database encryption and ciphertext query techniques", Journal of Donghua University (Natural Science), vol.33, no.4, pp.543-548, 2007.
-
(2007)
Journal of Donghua University (Natural Science)
, vol.33
, Issue.4
, pp. 543-548
-
-
Qin, Z.1
Yizhu, L.2
Le, J.3
-
11
-
-
33745637051
-
A more secure encryption mechanism in database systems
-
Cui Guohua, Hong Fan, Fu Xiaoqing, "A more secure encryption mechanism in database systems", Journal of Hua Zhong University of science and technology, vol.28, no.7, pp.29-31, 2000.
-
(2000)
Journal of Hua Zhong University of Science and Technology
, vol.28
, Issue.7
, pp. 29-31
-
-
Guohua, C.1
Fan, H.2
Xiaoqing, F.3
-
12
-
-
13944282904
-
Research on privacy homomorphic technique and the implementation of its algorithm
-
Yang Yong, Fang Yong, Zhou Anming, "Research on privacy homomorphic technique and the implementation of its algorithm", Computer Engineering, vol.31, no.2, pp.157-159, 2005.
-
(2005)
Computer Engineering
, vol.31
, Issue.2
, pp. 157-159
-
-
Yong, Y.1
Yong, F.2
Anming, Z.3
-
13
-
-
84860208860
-
-
Wang Xiaofeng, Wang Shangping, "The application of privacy homomorphic technique in the security of database", Computer Engineering and Applications, vol.39, no.14, pp.194-196, 2003
-
(2003)
The Application of Privacy Homomorphic Technique In the Security of Database", Computer Engineering and Applications
, vol.39
, Issue.14
, pp. 194-196
-
-
Xiaofeng, W.1
Shangping, W.2
-
16
-
-
0030150177
-
Comparing information without leaking it
-
Fagin R, Naor M, Winkler P, "Comparing information without leaking it", Communications of the ACM, vol.39, no.5, pp.77-85, 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
17
-
-
66349131521
-
A protocol of specific secure two-party computation
-
Qin Jing, Zhang Zhenfeng, Feng Dengguo, Li Bao, "A protocol of specific secure two-party computation", Journal on Communications, vol.25, no.11, pp.39-46, 2004.
-
(2004)
Journal On Communications
, vol.25
, Issue.11
, pp. 39-46
-
-
Jing, Q.1
Zhenfeng, Z.2
Dengguo, F.3
Li, B.4
-
18
-
-
22844441340
-
An efficient solution to Yao's millionaires'problem
-
Li Shundong, Dai Yiqi, You Qiyou, "An efficient solution to Yao's millionaires'problem", Asta Sinica Electronica, vol.33, no.5, pp.769-773, 2005.
-
(2005)
Asta Sinica Electronica
, vol.33
, Issue.5
, pp. 769-773
-
-
Li, S.1
Yiqi, D.2
Qiyou, Y.3
-
19
-
-
84860139271
-
The use of RSA cryptosystem to solve secure multi-party multi-data sorting problem
-
Qiu Mei, Luo Shoushan, Liu Wen, Chen Ping, "The use of RSA cryptosystem to solve secure multi-party multi-data sorting problem", Asta Sinica Electronica, vol.37, no.5, pp.1119-1123, 2009.
-
(2009)
Asta Sinica Electronica
, vol.37
, Issue.5
, pp. 1119-1123
-
-
Mei, Q.1
Shoushan, L.2
Wen, L.3
Ping, C.4
-
20
-
-
84860204691
-
The use of ElGamal cryptosystem to solve secure multi-party multi-data sorting problem
-
Liu Wen, Luo Shoushan, Chen Ping, "The use of ElGamal cryptosystem to solve secure multi-party multi-data sorting problem", Journal on Communications, vol.28, no.11, pp.1-5, 2007.
-
(2007)
Journal On Communications
, vol.28
, Issue.11
, pp. 1-5
-
-
Wen, L.1
Shoushan, L.2
Ping, C.3
-
21
-
-
57849083948
-
An adaptive privacy preserving data mining model under distributed environment
-
Li Feng, Ma Jin, Li Jianhua, "An adaptive privacy preserving data mining model under distributed environment", In Proc of International Conference on Signal Image Technologies and Internet Based Systems, pp.60-68, 2007
-
(2007)
Proc of International Conference On Signal Image Technologies and Internet Based Systems
, pp. 60-68
-
-
Li, F.1
Ma, J.2
Li, J.3
-
22
-
-
84860192036
-
-
Shanghai: Shanghai Jiao Tong University, China
-
Li Feng, "Privacy for data mining method", Shanghai: Shanghai Jiao Tong University, China, 2008.
-
Privacy For Data Mining Method
, pp. 2008
-
-
Li, F.1
-
24
-
-
78349288691
-
Constructing Secure Content-Dependent Watermarking Scheme Using Homomorphic Encryption
-
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun, "Constructing Secure Content-Dependent Watermarking Scheme Using Homomorphic Encryption", IEEE,vol.7, no.7, pp.627-630, 2007.
-
(2007)
IEEE
, vol.7
, Issue.7
, pp. 627-630
-
-
Li, Z.1
Zhu, X.2
Lian, Y.3
Sun, Q.4
-
25
-
-
84860182048
-
The encrypted storage and retrieval technology of cloud storage application
-
Huang Yongfeng, Zhang Jiuling, Li Xing, "The encrypted storage and retrieval technology of cloud storage application", ZTE Technologies, vol.16, no.4, pp.33-35, 2010.
-
(2010)
ZTE Technologies
, vol.16
, Issue.4
, pp. 33-35
-
-
Yongfeng, H.1
Jiuling, Z.2
Li, X.3
-
27
-
-
84856573536
-
Overview of Homomorphic Encryption Scheme
-
Xun-yi Ren, Li-Li wei,"Overview of Homomorphic Encryption Scheme" Journal of Convergence Information Technology(JCIT) vol.7, no.1, pp.442-447, 2012.
-
(2012)
Journal of Convergence Information Technology(JCIT)
, vol.7
, Issue.1
, pp. 442-447
-
-
Ren, X.-Y.1
Wei, L.-L.2
|