Homomorphic Encryption
6,849 Followers
Recent papers in Homomorphic Encryption
Organizations and individuals have been moving to the cloud computing technology looking for effective and fast computing services. Confidential information is becoming more vulnerable to leak due to outsource computations to... more
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from... more
Questo lavoro è diviso in due parti. Nella prima vi è uno studio dei concetti di privacy by design e by default introdotti col GDPR. Viene presentato uno strumento (questionario) in grado di analizzare la compliance al regolamento e... more
The goal of this chapter is to present a survey of homomorphic encryption techniques and their applications. After a detailed discussion on the introduction and motivation of the chapter, we present some basic concepts of cryptography.... more
Organizations and individuals have been shifting to the Internet-based cloud computing technology to obtain more efficient and faster computing services in recent years. However, moving to the cloud services has created new security... more
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security,... more
Wireless networks are truly pervasive in the modern environment: from the workplace and the home, to implanted medical devices. Network security, therefore, is of paramount importance. This volume begins with an overview of the security... more
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
some selected solution on Assignments/Review Questions
From the Book: Data Communications & Networks by Forouzan. A Behrouz By Lecturer: Prof. Daniel Okunbor
From the Book: Data Communications & Networks by Forouzan. A Behrouz By Lecturer: Prof. Daniel Okunbor
Security has become one of the key features of data transmission on large database. RDBMS are used for storage purposes but with applications generating enormous amount of data, RDBMS is no longer efficient because RDBMS doesn't support... more
Although cloud computing continues to grow rapidly, shifting to Internet-based shared computing service has created new security challenge. Organizations move to the cloud technology looking for efficient and fast computing but data... more
NTRU is being considered as part of the NIST quantum resistant cryptography standard. While NIST has received substantial attention in the literature, more analysis is needed. This current study uses a unique approach. The team of... more
An encryption scheme is “homomorphic” if it is possible to perform implicit operation on the plaintext by processing the ciphertext only. The scheme is said to be “fully homomorphic’’ when we can perform (a sequence of operations) both... more
This paper presents an application for an e-voting system on Android OS. Our study is about Elliptic Curve Cryptography (ECC) that has features of homomorphic encryption. This application is aimed to develop an electronic election... more
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form... more
Data Mining has gained attention nowadays in the field of sales, marketing, insurance and healthcare applications to name a few. Organizations aspire to perform mining operations on their joint datasets for gaining trade benefits while... more
The biggest advantage of building “intelligence” into a sensor is that the sensor can process data before sending them to a data consumer. The kind of processing that is often needed is to aggregate the data into a more compact... more
An encryption scheme is “homomorphic” if it is possible to perform implicit operation on the plaintext by processing the ciphertext only. The scheme is said to be “fully homomorphic’’ when we can perform (a sequence of operations) both... more
Organizations and individuals have been shifting to the Internet-based cloud computing technology to obtain more efficient and faster computing services in recent years. However, moving to the cloud services has created new security... more
Recently there has been a huge interest in secure and private cloud computing. In particular; to perform signal processing and machine learning tasks in the encrypted domain. Homomorphic encryption offers provably secure, asymmetric... more
MORE (Matrix Operation for Randomization or Encryption) is a free-noise fully homomorphic encryption scheme [8]. It is a symmetric scheme invented in 2012 by Kipnis and Hibshoush. The homomorphy of this cryptosystem is obtained via matrix... more
One of the most widespread computer applications used for person-to-person or organization-to-organization communication is the electronic mail (email or e-mail). The main objective for this study is to develop an emailing solution that... more
This paper details Implementation of the Encryption algorithm AES under VHDL language In FPGA by using different architecture of mixcolumn. We then review this research investigates the AES algorithm in FPGA and the Very High Speed... more
In this paper, the notion α -anti fuzzy new-ideal of a PU-algebra are defined and discussed. The homomorphic images (pre images) ofα -anti fuzzy new-ideal under homomorphism of a PU-algebras has been obtained. Some related result have... more
In recent years, the trend has increased for the use of cloud computing, which provides broad capabilities with the sharing of resources, and thus it is possible to store and process data in the cloud remotely, but this (cloud) is... more
Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station. Hence,... more