Author:
Zaraket Christiana,Hariss Khalil,Ephrem Sandro,Chamoun Maroun,Nicolas Tony
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference24 articles.
1. Gajbhiye, A., Shrivastva, K.M.P.: Cloud computing: need, enabling technology, architecture, advantages and challenges. In: 2014 5th International Conference-Confluence The Next Generation Information Technology Summit (Confluence), IEEE, pp. 1–7 (2014)
2. Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis. Stan-ford University.crypto.stanford.edu/craig (2009)
3. Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. (2018). https://doi.org/10.1145/3214303
4. Morris, L.: Analysis of Partially and Fully Homomorphic Encryption. Rochester Institute of Technology, pp. 1–5 (2013)
5. Lim, H.W., Tople, S., Saxena, P., Chang, E.C.: Faster secure arithmetic computation using switchable homomorphic encryption. IACR Cryptol. ePrint Arch. 2014, 539 (2014)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Similarity calculation based on homomorphic encryption;Applied Research;2024-06-20
2. PPMO-AHE: Efficient Merge Operations for Encrypted Data Using Additive Homomorphism;2024 International Conference on Recent Advances in Electrical, Electronics, Ubiquitous Communication, and Computational Intelligence (RAEEUCCI);2024-04-17
3. Smart contract-based integrity audit method for IoT;Information Sciences;2023-11