Affiliation:
1. Qinghai Higher Vocational and Technology College , Haidong, Qinghai , China
Abstract
Abstract
In recent years, homomorphic encryption has attracted much research attention in the international cryptography community and is applied in various industries to enhance data confidentiality. With the advent of the era of big data, more and more data are available through online, using users another how to propose privacy protection models applicable to consumer data application scenarios under the premise of meeting data privacy, security and regulatory requirements, so that the models can formulate accurate marketing strategies more scientifically based on a large amount of consumer data, is the key to the current competition. In this process, more and more people are concerned about privacy confidentiality and security, and homomorphic encryption is of great significance for data processing security.
Subject
Applied Mathematics,Engineering (miscellaneous),Modeling and Simulation,General Computer Science
Reference41 articles.
1. Rivest R. Adleman L. dertouzos M. On date banks and privacy homorphisms [M] Foundations of Secure Computation. New Yory: Academic Press. 1978: 169–180
2. Gentry C. Fully homomorphic encryption using ideal lattices [C]//Proceedings of the forty-first annual ACM symposium on Theory of computing. STOC: Bethesda, MD, USA, 2009.
3. Dijk M. Gentry C. Halevi S. et al. Fully homorphic encryption over the integers
4. //LNCS 6110: Procof EUROCRYPT 2010. Berlin: Springer. 2010: 24–43
5. Dowlin N, Rang B, Laine K, et a1. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy[C]//Radio and Wireless Symposium. 2016: 76–78.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献