2012 National Days of Network Security and Systems 2012
DOI: 10.1109/jns2.2012.6249248
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic encryption method applied to Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
64
0
3

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 84 publications
(67 citation statements)
references
References 5 publications
0
64
0
3
Order By: Relevance
“…(He is now at IBM Research.) Since then, further refinements and more new ideas have been coming at a rapid pace [13].…”
Section: B Homomorphic Cryptographymentioning
confidence: 99%
“…(He is now at IBM Research.) Since then, further refinements and more new ideas have been coming at a rapid pace [13].…”
Section: B Homomorphic Cryptographymentioning
confidence: 99%
“…Users using the same state properties, it is possible without using the decryption key conditions ciphertext direct operation, so as to realize the corresponding plaintext operation, the operation will not disclose information about the plaintext, these basic operations, such as: addition, subtraction, multiplication and division. Literature [17,18] has been demonstrated, RSA has a multiplicative homomorphic encryption scheme, and its multiplicative homomorphic properties are summarized as follows:…”
Section: Rsa Keys In Consultation With the Statementioning
confidence: 99%
“…Homomorphic Encryption has mainly two properties, Additive Homomorphic Encryption: A Homomorphic encryption is additive, if [12]:…”
Section: Properties Of Homomorphic Encryptionmentioning
confidence: 99%