메뉴 건너뛰기




Volumn , Issue , 2012, Pages 86-89

Homomorphic encryption method applied to cloud computing

Author keywords

Cloud Computing; Homomorphic Encryption; Security

Indexed keywords

CLOUD PROVIDERS; ENCRYPTED DATA; ENCRYPTION METHODS; HOMOMORPHIC-ENCRYPTIONS; REMOTE SERVERS; SECURITY;

EID: 84866655094     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/JNS2.2012.6249248     Document Type: Conference Paper
Times cited : (35)

References (10)
  • 2
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Prague, Czech Republic
    • Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In 18th Annual Eurocrypt Conference (EUROCRYPT'99), Prague, Czech Republic, volume 1592, 1999
    • (1999) 18th Annual Eurocrypt Conference (EUROCRYPT'99) , vol.1592
    • Paillier, P.1
  • 4
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2) :120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 5
    • 34248375392 scopus 로고    scopus 로고
    • Springer
    • Computer Science, pages 223-238. Springer, 1999.
    • (1999) Computer Science , pp. 223-238
  • 6
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , pp. 469-472
    • Elgamal, T.1
  • 8
    • 0031232428 scopus 로고    scopus 로고
    • The Magma algebra system I: The user language
    • Computational algebra and number theory ,London, 1993
    • WiebBosma, John Cannon, and Catherine Playoust. The Magma algebra system I: The user language. J. Symbolic Comput., 24(3-4): 235-265,1997.Computational algebra and number theory ,London,1993.
    • (1997) J. Symbolic Comput. , vol.24 , Issue.3-4 , pp. 235-265
    • Bosma, W.1    Cannon, J.2    Playoust, C.3
  • 10
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • volume 3378 of Lecture Notes in Computer Science, Springer
    • Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-DNF formulas on ciphertexts. In Theory of Cryptography Conference, TCC'2005, volume 3378 of Lecture Notes in Computer Science, pages 325-341. Springer, 2005.
    • (2005) Theory of Cryptography Conference, TCC'2005 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.