2020
DOI: 10.1109/jiot.2020.2998109
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Framework for Privacy-Preserving Computations on Encrypted IoT Data

Abstract: I would like to dedicate this thesis to my familymy parents, Ramesh Rengaswamy and Vijay Ramesh who have always been the constant source of unconditional love, support and encouragement, my brother Dr. Sridharan Ramesh, for always being there whenever I needed moral support, motivation and guidance and to my partner Sudarsanan Krishnan, for the cheers, support and sacrifices throughout this journey. iii

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 44 publications
0
10
0
Order By: Relevance
“…Adaptation and secure Identity-based broadcast encryption systems are, in the standard model, equipped with a certain size cipher text [4]. The secret key of the size of the public key is linear to the maximum number of recipients [5]. Also, our system is completely rigging, has a stateless receiver.…”
Section: Related Workmentioning
confidence: 99%
“…Adaptation and secure Identity-based broadcast encryption systems are, in the standard model, equipped with a certain size cipher text [4]. The secret key of the size of the public key is linear to the maximum number of recipients [5]. Also, our system is completely rigging, has a stateless receiver.…”
Section: Related Workmentioning
confidence: 99%
“…Interleaved multiplication is used to construct this adder-based design [9], which was described before. The central processing unit employs a Montgomery MM algorithm that has a multiplier that is r bits by r bits [10]. A multiplier that is n bits by n bits is used in the construction of the processors [11].…”
Section: Introductionmentioning
confidence: 99%
“…Internet of ings (IoT) devices are very common in our daily life, and more and more physical entities are connected to cyberspace. A series of intelligent applications derived from IoT such as smart home, smart medical, and smart grid are profoundly changing social public services and people's daily life [1]. As a key biometric technology to authenticate personal identity, facial recognition and resolution technology can collect any object that needs monitoring and interaction through information sensors.…”
Section: Introductionmentioning
confidence: 99%
“…RS 􏼁 􏼁,(1) which binds public key and identity.Similarly, MS has a unique ID MS , x MS , y MS � g x MS modq, authorization certificate…”
mentioning
confidence: 99%