2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech) 2018
DOI: 10.1109/cloudtech.2018.8713353
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Secured Protocol based on Partial Homomorphic Encryptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Homomorphic Encryption: This is a technique that allows computations to be performed on encrypted data without decrypting them. This technique ensures that the data remain encrypted throughout the computation process, thus preserving the privacy of the data [2][3][4][5][6][7][8][9][10][11].…”
Section: Privacy-preservation In Deep Learningmentioning
confidence: 99%
“…Homomorphic Encryption: This is a technique that allows computations to be performed on encrypted data without decrypting them. This technique ensures that the data remain encrypted throughout the computation process, thus preserving the privacy of the data [2][3][4][5][6][7][8][9][10][11].…”
Section: Privacy-preservation In Deep Learningmentioning
confidence: 99%
“…In the aspect of data security privacy protection, secure multi-party computation based on homomorphic encryption has become more and more mainstream to protect data privacy [21]. Mostapha Derfouf et al proposed a security protocol based on partial homomorphic encryption [22], and compared the protocol with the fully homomorphic encryption protocol, and analyzed the advantages and disadvantages of the two schemes. Effectively solving the security challenges in cloud computing is the foundation of establishing the Industrial Internet of Things(IIoT) [23].…”
Section: Related Workmentioning
confidence: 99%
“…Like any encryption schema, HE includes four functions when applying it, these functions are key generation, encryption, evaluation, and decryption [49], [50]. Mathematically, HE means translation of one data set to an alternative one, without losing its relation between them [17].…”
Section: Definitionmentioning
confidence: 99%
“…HE has been classified into three types depending on the number of mathematical operations that can be performed. These types are [46], [49], [50], [53], [54]: − Partial HE: Performs addition or multiplication operation (not both). − Somewhat HE: Performs a bounded number of addition and multiplication operations.…”
Section: Categoriesmentioning
confidence: 99%