2020
DOI: 10.14778/3389133.3389144
|View full text |Cite
|
Sign up to set email alerts
|

Efficient confidentiality-preserving data analytics over symmetrically encrypted datasets

Abstract: In the past decade, cloud computing has emerged as an economical and practical alternative to in-house datacenters. But due to security concerns, many enterprises are still averse to adopting third party clouds. To mitigate these concerns, several authors have proposed to use partially homomorphic encryption (PHE) to achieve practical levels of confidentiality while enabling computations in the cloud. However, these approaches are either not performant or not versatile enough. We present two novel PHE schemes,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 33 publications
0
19
0
Order By: Relevance
“…An HE scheme that supports multiplication is said to be multiplicative. Symmetria [19] is also multiplicative using a distinct scheme than the one for addition. Other well-known multiplicative HE schemes include RSA [18] and ElGamal [6].…”
Section: Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…An HE scheme that supports multiplication is said to be multiplicative. Symmetria [19] is also multiplicative using a distinct scheme than the one for addition. Other well-known multiplicative HE schemes include RSA [18] and ElGamal [6].…”
Section: Background and Related Workmentioning
confidence: 99%
“…An HE scheme that supports both addition and multiplication is called a fully HE scheme. This requirement should not be confused with specific addition and multiplication parameters, such as Symmetria [19] and NTRU [9]. That is, the addition and multiplication must be supported homomorphically under exactly the same scheme ℎ𝑒 (•):…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, in the context of DaaS, the user usually serves as both the sender and the receiver and there is no need to distribute the key. To this end, symmetric (partially) homomorphic encryption (SHE), was proposed [26,29]. This paper is along this line of research.…”
Section: Introductionmentioning
confidence: 99%