메뉴 건너뛰기




Volumn , Issue , 2014, Pages 337-345

A tale of two clouds: Computing on data encrypted under multiple keys

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY; NUMBER THEORY;

EID: 84921530000     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CNS.2014.6997502     Document Type: Conference Paper
Times cited : (55)

References (38)
  • 1
    • 84921482714 scopus 로고    scopus 로고
    • [Online]
    • [Online]. Available: https://immersion.media.mit.edu/
  • 2
    • 84855974342 scopus 로고    scopus 로고
    • Cloud data protection for the masses
    • D. Song, E. Shi, I. Fischer, and U. Shankar, "Cloud Data Protection for the Masses, " IEEE Computer, vol. 45, no. 1, pp. 39-45, 2012.
    • (2012) IEEE Computer , vol.45 , Issue.1 , pp. 39-45
    • Song, D.1    Shi, E.2    Fischer, I.3    Shankar, U.4
  • 3
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud, " IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
    • (2012) IEEE Internet Computing , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 4
    • 84921494946 scopus 로고    scopus 로고
    • On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
    • A. López, E. Tromer, and V. Vaikuntanathan, "On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption, " in Proc. of STOC 2012, 2012.
    • (2012) Proc. of STOC 2012
    • López, A.1    Tromer, E.2    Vaikuntanathan, V.3
  • 5
    • 77954592905 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices, " in Proc. of STOC'09, 2009.
    • (2009) Proc. of STOC'09
    • Gentry, C.1
  • 7
    • 80955132201 scopus 로고    scopus 로고
    • Efficient Fully Homomorphic Encryption from (Standard) LWE
    • Z. Brakerski and V. Vaikuntanathan, "Efficient Fully Homomorphic Encryption from (Standard) LWE, " in Proc. of FOCS'11, 2011.
    • (2011) Proc. of FOCS'11
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 8
    • 0020312165 scopus 로고
    • Protocols for Secure Computations
    • A. Yao, "Protocols for Secure Computations, " in Proc. of FOCS, 1982, pp. 160-164.
    • (1982) Proc. of FOCS , pp. 160-164
    • Yao, A.1
  • 11
    • 0345058960 scopus 로고    scopus 로고
    • A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
    • E. Bresson, D. Catalano, and D. Pointcheval, "A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications, " in Proc. of ASIACRYPT'03, 2003, pp. 37-54.
    • (2003) Proc. of ASIACRYPT'03 , pp. 37-54
    • Bresson, E.1    Catalano, D.2    Pointcheval, D.3
  • 12
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, " in Proc. of NDSS'05, 2005.
    • (2005) Proc. of NDSS'05
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 13
    • 84969931080 scopus 로고    scopus 로고
    • On the impossibility of cryptography alone for privacy-preserving cloud computing
    • M. van Dijk and A. Juels, "On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing, " in Proc. of HotSec'10. USENIX, 2010, pp. 1-8.
    • Proc. of HotSec'10. USENIX , vol.2010 , pp. 1-8
    • Van Dijk, M.1    Juels, A.2
  • 14
    • 84901750940 scopus 로고    scopus 로고
    • Secure k-nearest neighbor query over encrypted data in outsourced environments
    • Y. Elmehdwi, B. Samanthula, and W. Jiang, "Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments, " in Proc. of IEEE ICDE'14, 2014.
    • (2014) Proc. of IEEE ICDE'14
    • Elmehdwi, Y.1    Samanthula, B.2    Jiang, W.3
  • 16
    • 84989843534 scopus 로고    scopus 로고
    • Computing encrypted cloud data efficiently under multiple keys
    • B. Wang, M. Li, S. S. M. Chow, and H. Li, "Computing Encrypted Cloud Data Efficiently under Multiple Keys, " in Proc. of CNS-SPCC, 2013.
    • (2013) Proc. of CNS-SPCC
    • Wang, B.1    Li, M.2    Chow, S.S.M.3    Li, H.4
  • 20
    • 0002513231 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti, "Universally Composable Security: A New Paradigm for Cryptographic Protocols, " in Proc. of FOCS'01, 2001.
    • (2001) Proc. of FOCS'01
    • Canetti, R.1
  • 21
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, " in Proc. of ACM CCS'06, 2006.
    • (2006) Proc. of ACM CCS'06
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 23
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible Protocols and Atomic Proxy Cryptography, " in Proc. of Eurocrypt, 1998, pp. 127-144.
    • (1998) Proc. of Eurocrypt , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 25
    • 84871555906 scopus 로고    scopus 로고
    • Enhanced flexibility for homomor-phic encryption schemes via CRT
    • Y. Hu, W. J. Martin, and B. Sunar, "Enhanced Flexibility for Homomor-phic Encryption Schemes via CRT, " in Proc. of ACNS'12, 2012.
    • (2012) Proc. of ACNS'12
    • Hu, Y.1    Martin, W.J.2    Sunar, B.3
  • 26
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation mod p
    • J. M. Pollard, "Monte Carlo Methods for Index Computation mod p, " Mathematics of Computation, vol. 32, no. 143, 918-924 1978.
    • (1978) Mathematics of Computation , vol.32 , Issue.143 , pp. 918-924
    • Pollard, J.M.1
  • 28
    • 84921489316 scopus 로고    scopus 로고
    • [Online]
    • [Online]. Available: http://crypto.stanford.edu/pbc/
  • 30
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaum, C. Crepeau, and I. Damgård, "Multiparty Unconditionally Secure Protocols, " in Proc. of STOC, 1988, pp. 11-19.
    • (1988) Proc. of STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgård, I.3
  • 32
    • 79955532534 scopus 로고    scopus 로고
    • Fully homomorphic encryption with relatively small key and ciphertext sizes
    • N. P. Smart and F. Vercauteren, "Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes, " in Proc. of PKC, 2010, pp. 420-443.
    • (2010) Proc. of PKC , pp. 420-443
    • Smart, N.P.1    Vercauteren, F.2
  • 33
    • 80051976682 scopus 로고    scopus 로고
    • Secure computation on the web: Computing without simultaneous interaction
    • S. Halevi, Y. Lindell, and B. Pinkas, "Secure Computation on the Web: Computing without Simultaneous Interaction, " in Proc. of CRYPTO'11, 2011, pp. 132-150.
    • (2011) Proc. of CRYPTO'11 , pp. 132-150
    • Halevi, S.1    Lindell, Y.2    Pinkas, B.3
  • 35
    • 84869441394 scopus 로고    scopus 로고
    • Salus: A system for server-aided secure function evaluation
    • S. Kamara, P. Mohassel, and B. Riva, "Salus: A System for Server-Aided Secure Function Evaluation, " in Proc. of ACM CCS'12, 2012, pp. 797-808.
    • (2012) Proc. of ACM CCS'12 , pp. 797-808
    • Kamara, S.1    Mohassel, P.2    Riva, B.3
  • 36
    • 79960885939 scopus 로고    scopus 로고
    • Two-party computation model for privacy-preserving queries over distributed databases
    • S. S. M. Chow, J.-H. Lee, and L. Subramanian, "Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases, " in Proc. of NDSS'09, 2009.
    • (2009) Proc. of NDSS'09
    • Chow, S.S.M.1    Lee, J.-H.2    Subramanian, L.3
  • 37
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • C. Wang, K. Ren, and J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing, " in Proc. of INFOCOM, 2011, pp. 820-828.
    • (2011) Proc. of INFOCOM , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 38
    • 80051894689 scopus 로고    scopus 로고
    • Harnessing the cloud for securely solving large-scale systems of linear equations
    • C. Wang, K. Ren, J. Wang, and K. M. R. Urs, "Harnessing the Cloud for Securely Solving Large-scale Systems of Linear Equations, " in Proc. of ICDCS, 2011.
    • (2011) Proc. of ICDCS
    • Wang, C.1    Ren, K.2    Wang, J.3    Urs, K.M.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.