2017
DOI: 10.3233/jcs-16830
|View full text |Cite
|
Sign up to set email alerts
|

Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…As already mentioned, the implementation of the homomorphic encryption is not yet possible because of some problems related to performance. Several researches trying to find solutions and alternatives that will remedy to these problems while providing models that ensures users privacy in clouds (Wüller et al, 2017;Chen et al, 2014). Tebaa et al (2015) propose a hybrid homomorphic system that is applied to the banking data to perform operations on encrypted data without decrypting it.…”
Section: Related Work and Research Scopementioning
confidence: 99%
“…As already mentioned, the implementation of the homomorphic encryption is not yet possible because of some problems related to performance. Several researches trying to find solutions and alternatives that will remedy to these problems while providing models that ensures users privacy in clouds (Wüller et al, 2017;Chen et al, 2014). Tebaa et al (2015) propose a hybrid homomorphic system that is applied to the banking data to perform operations on encrypted data without decrypting it.…”
Section: Related Work and Research Scopementioning
confidence: 99%
“… 16 17 18 However, more complex protocols applying homomorphic encryption techniques are also feasible. 19 While multiple SMPC frameworks have been developed in the past, most approaches are impeded by the connection and network setup of the participating entities due to the computational overhead induced by the chosen SMPC protocol. Especially, if the level of computational complexity increases (e.g., additional parties or more complex tasks), the network bandwidth could pose a significant bottleneck yielding inefficient runtimes.…”
Section: Introductionmentioning
confidence: 99%