2014 Information Theory and Applications Workshop (ITA) 2014
DOI: 10.1109/ita.2014.6804228
|View full text |Cite
|
Sign up to set email alerts
|

Efficient homomorphic encryption on integer vectors and its applications

Abstract: Abstract-Homomorphic encryption, aimed at enabling computation in the encrypted domain, is becoming important to a wide and growing range of applications, from cloud computing to distributed sensing. In recent years, a number of approaches to fully (or nearly fully) homomorphic encryption have been proposed, but to date the space and time complexity of the associated schemes has precluded their use in practice. In this work, we demonstrate that more practical homomorphic encryption schemes are possible when we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
59
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 83 publications
(59 citation statements)
references
References 20 publications
0
59
0
Order By: Relevance
“…APPLICATIONS We first portray the distinctive however more conventional situation that has been the concentration of a significant part of the homomorphic encryption writing to date [2]. As portrayed in Fig.…”
Section: Ivsecurity Threats In Cloud Computingmentioning
confidence: 99%
“…APPLICATIONS We first portray the distinctive however more conventional situation that has been the concentration of a significant part of the homomorphic encryption writing to date [2]. As portrayed in Fig.…”
Section: Ivsecurity Threats In Cloud Computingmentioning
confidence: 99%
“…The encryption scheme proposed in [20] is a homomorphic encryption scheme that supports three operations: addition, linear transformation and weighted inner products. Moreover, based on the three fundamental operations, the scheme enables to compute arbitrary polynomials.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, based on the three fundamental operations, the scheme enables to compute arbitrary polynomials. As stated in [20], these operations can be useful in applications where tasks as feature extraction, recognition, classification, and data aggregation are needed. This scheme is a natural generalization of the PVW scheme [13] from binary vectors to integer vectors where techniques as ciphertext packing [1] and key switching [3] are employed to optimize the scheme.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations