A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Provably Secure Additive and Multiplicative Privacy Homomorphism*
[chapter]
2002
Lecture Notes in Computer Science
Privacy homomorphisms (PHs) are encryption transformations mapping a set of operations on cleartext to another set of operations on ciphertext. ...
If addition is one of the ciphertext operations, then it has been shown that a PH is insecure against a chosen-cleartext attack. ...
Thanks go to Stefan Brands and Josep Rifà for useful talks and comments. ...
doi:10.1007/3-540-45811-5_37
fatcat:s3bwp6qpazd2blr523lktts6qa
Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption
2016
MATEC Web of Conferences
While accessing or sharing information stored in the cloud, the main concern is to enhance the security of data. Different encryption techniques can be used to provide strict privacy requirements. ...
Dual encrypting the data using Advanced Encryption Standard and Homomorphic Encryption scheme enables the data users to ensure the integrity of requested data. ...
Dual Security with fully homomorphic encryption aims to bring forth the following objective-Dual encryption to provide additional security on stored data using AES encryption standard and Homomorphic encryption ...
doi:10.1051/matecconf/20165601002
fatcat:eqxwvrk2cvc5fhnzzvxiz6qrri
Survey of Various Homomorphic Encryption algorithms and Schemes
2014
International Journal of Computer Applications
But to process data located on remote server and to preserve privacy, homomorphic encryption is useful that allows the operations on the cipher text, which can provide the same results after calculations ...
When the data is transferred to the public area, there are many encryption algorithms to secure the operations and the storage of the data. ...
Few years later, in 2005, Dan Boneh, Eu-Jin Goh and Kobi Nissim [9] invented a system of provable security encryption, with which unlimited number of additions but only one multiplication can be performed ...
doi:10.5120/15902-5081
fatcat:x5y7cns7k5bbbjacyg3skl6xlu
Concise Survey on Privacy Preserving Techniques in Cloud
IARJSET - Science, Engineering and Technology
2015
IARJSET
IARJSET - Science, Engineering and Technology
Homomorphic Authenticable Ring Signature (HARS), privacy-preserving public auditing System for data storage security are discussed. ...
In this paper we have made a concise survey on various privacy preserving techniques in cloud. ...
The direct addition of PDP or POR schemes to pillar data dynamics have security problems. The experiments display that the scheme is capable in aiding data dynamics with provable verification. ...
doi:10.17148/iarjset.2015.2206
fatcat:hk7ocm7hu5cqfdw6bbvmsrdhtq
Study on Auditing Approaches for Preserving Data Integrity in Cloud Storage
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Cloud computing provides cloud storage a service in which data is maintained, managed and backed up remotely through a centralized large data centres and made available to user over a network. ...
This paper makes comparative analysis over different approaches and choose the best approach for checking the integrity of the data. ...
for ensuring
possession of files on trusted
storage
Is a technique for ensuring
both possession and
retrievability
Is a privacy preserving mechanism
Uses
or Utilizes
Uses RSA based Homomorphic ...
doi:10.23956/ijarcsse/v7i3/0146
fatcat:h62qz456u5gdbeywefx6n66tku
A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage
2015
Journal of Internet Services and Information Security
Remote data auditing refers to a sampling of the outsourced data to securely, frequently, and efficiently verify the correctness of the data in the cloud. ...
We explain the concept of remote data auditing, and then describe system model and taxonomy of remote data auditing schemes, especially focusing on provable data possession schemes which support public ...
Therefore, Zhu et al. proposed a cooperative provable data possession (CPDP) scheme based on homomorphic verifiable response (HVR) and hash index hierarchy to support dynamic scalability on multiple storage ...
doi:10.22667/jisis.2015.08.31.037
dblp:journals/jisis/ShinK15
fatcat:wqy6parzbndhvi2mt24anqcgle
Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing
IJIREEICE - Electrical, Electronics, Instrumentation and Control
2014
IJIREEICE
IJIREEICE - Electrical, Electronics, Instrumentation and Control
responsible for keeping the data available and accessible.but the security of cloud storage is always the focus of several potential cloud clients,and huge impact for its widespread application. ...
Multi Owner Authentication technique is by which we can secure the data Stored in the Cloud Server's Database.the security and routine analysis shows that the scheme is practical for real time. ...
. Provable security. ...
doi:10.17148/ijireeice.2014.21111
fatcat:735k3g5cavcmjhou7zsekffy64
Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT"
2014
Proceedings of the 2nd ACM workshop on Information hiding and multimedia security - IH&MMSec '14
Their fundamental building block is a new protocol for performing secure comparisons under additively homomorphic encryption that requires no interaction. ...
Protocols for secure comparison are a fundamental building block of many privacy-preserving protocols such as privacy-preserving face recognition or privacy-preserving fingerprint authentication. ...
Interactive Protocols using Additively Homomorphic Encryption Existing and provably secure protocols for secure comparisons can be used instead, e.g., [BK04, DGK08b, DGK08a, KSS09] . ...
doi:10.1145/2600918.2600927
dblp:conf/ih/SchneiderS14
fatcat:hifivsismre4law5jn6hpmmrp4
Multiplicative Homomorphic E-Auction with Formally Provable Security
[chapter]
2013
Lecture Notes in Computer Science
Another contribution of the new multiplicative homomorphic e-auction scheme is that it is the first e-auction scheme to provide formal and comprehensive security analysis to achieve formally provable security ...
A new method, homomorphic e-auction based on multiplicative homomorphic encryption algorithm like ElGamal encryption is proposed in this paper. ...
It satisfies all the security properties and is the only e-auction scheme to achieve formally provable security. ...
doi:10.1007/978-3-642-38530-8_1
fatcat:3cymq2zvtjdrfgx4rmbsh6fe7u
A SURVEY: CLOUD COMPUTING SECURITY ISSUES AND TECHNIQUES
2017
International Journal of Advanced Research in Computer Science
Literature survey shows that the protocols are focused on different aspects such as dynamic data operations, privacy protection of the data, the high efficiency, the privacy protection of the identities ...
Though cloud computing has various advantages to users, it brings new security challenging problems. ...
The ID based is a combination of ID based cryptography technique with homomorphic auditor technique, it is provably secure in the random oracle model and has high security reduction in the cloud computing ...
doi:10.26483/ijarcs.v8i7.4377
fatcat:yl7umbggmbeshbex4tbviak23a
A Proposed Secure Cloud Environment Based on Homomorphic Encryption
2019
IARJSET
In this paper, users' data is never kept in the form of plaintext on public cloud and proposed a Secure Cloud Environment Based on Homomorphic Encryption (SCEHE) to develop the security of cloud computing ...
the user without decryption using the homomorphic encryption to be protected user's privacy. ...
The encryption scheme of Shafi Goldwasser and Silvio Micali was suggested in 1982 was a provable security encryption method which reached a notable level of security, it was an additive Homomorphic encryption ...
doi:10.17148/iarjset.2019.6524
fatcat:kuk52a6rc5be5kxt6ck5nmoflq
Survey of Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession
2014
International Journal of Computer Applications
On the basis on homomorphic verifiable response and hash index hierarchy we projected a cooperative PDP (CPDP) method. ...
We confirm the security of our method based on multi-prover zeroknowledge proof scheme, which can satisfy knowledge soundness, fullness , and zero-knowledge properties. ...
Less Security -None of the cryptographic techniques is used on the cloud data
Privacy-Preserving Audit And Extraction Of Digital Contents
Please
This paragraph is a repeat of 3.1 Please A growing ...
doi:10.5120/17836-8716
fatcat:lhlehqrhffh2noowhnubgvekze
A Homomorphic Crypto System for Electronic Election Schemes
2016
Circuits and Systems
The other homomorphic cryptosystems RSA and Elgamal are not considered, since they exhibit only multiplicative homomorphic property. ...
This research investigates the applications of homomorphic encryption systems in electronic voting schemes. We make use of Paillier cryptosystem which exhibits additive homomorphic properties. ...
In 1999 Pascal Paillier proposed a provable secure encryption system that was an additive Homomorphic encryption. ...
doi:10.4236/cs.2016.710272
fatcat:3wrlw7rc25hffm65vmaztsqxfa
An Improved Approach for Secure Data Aggregation in Wireless Sensor Networks
2016
International Journal of Computer Applications
In this paper, we investigate various approaches for data aggregation with a view to critically analyze the same and propose a new approach for secure data aggregation. ...
However, due to the ubiquitous and pervasive deployment of the sensor nodes, the security concerns in WSNs are anyway critical. ...
Given a, b Q and k, k1, k2 K, we term a + b = Dk (Ek(a) Ek(b)) additively homomorphic with a single secret key and a + b = Dk (k1,k2) (Ek1(a) Ek2(b)) additively homomorphic with multiple secret ...
doi:10.5120/ijca2016908898
fatcat:7vrtid75cfduhga7szkcmlpwyy
Secure Audit Service by using TPA
2016
International Journal of Computer Applications
Also, the auditing process should not bring in further more burdens to the user, a secure cloud storage for which integrate the technique of Homomorphic linear authenticator with random masking. ...
Using Cloud Storage, users can remotely store their data and enjoy high quality applications and services from a shared pool of resources. ...
When used directly, their protocol is not provably privacy preserving, and thus may leak user data information to the external auditor. Juels et al. ...
doi:10.5120/ijca2016909136
fatcat:3rtg2lrp2bhmneu33yhulh7oyi
« Previous
Showing results 1 — 15 out of 1,985 results