2013
DOI: 10.1109/msp.2012.2230219
|View full text |Cite
|
Sign up to set email alerts
|

Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 131 publications
(47 citation statements)
references
References 31 publications
0
47
0
Order By: Relevance
“…In particular, in the work of [7], the same server requests would generate the same tags. For a simple and general overview of homomorphic encryption concepts the reader is encouraged to read [1], [5], [28].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, in the work of [7], the same server requests would generate the same tags. For a simple and general overview of homomorphic encryption concepts the reader is encouraged to read [1], [5], [28].…”
Section: Related Workmentioning
confidence: 99%
“…For example, if the application in hand needs many multiplication operations to be done to match one entry as in (1), this may lead to the rapid growth of the noise in the Ctxt to the limit that it may not be decrypted correctly. On the other hand, as discussed in Section 3.1.1, in the case of non-matching items, the result will have much less noise.…”
Section: Optimizationmentioning
confidence: 99%
“…To our knowledge, the idea of sorting an array of encrypted integers was first discussed by Carlos et al [3]. Here authors explicitly presented control flow of Bubble sort algorithm that can sort encrypted data.…”
Section: B Related Workmentioning
confidence: 99%
“…In any case, however, we can use a standard compiler to create the processing software and can "directly" run this code on encrypted data. Note that this is an essential difference to alternative approaches (like GC or FHE), which require specialpurpose compilers [32][33][34] and designated code/circuit generation [35] that is specific for a particular function. Unlike this, the computing platform sketched here is "general purpose".…”
Section: Securitymentioning
confidence: 99%