A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is
Proceedings of the 10th International Conference on Security and Cryptography
We then present a generic construction using CP-ABE and multikey Fully-Homomorphic encryption (FHE). ... There has been limited success so far achieving homomorphic encryption in the functional setting; that is, for primitives such as Ciphertext-Policy Attribute Based Encryption (CP-ABE) and Identity Based ... Acknowledgments We would like to thank the anonymous reviewers of SECRYPT 2013 for their helpful suggestions. ...doi:10.5220/0004534304440452 fatcat:y3enx3arhjd5fi7vi7hdysug54
Due to the sensitivity of genomic data, these data should be encrypted using different keys. However, supporting computation on ciphertexts encrypted under multiple keys is a non-trivial task. ... New cryptographic techniques such as homomorphic encryption (HE) allow computations to be outsourced to and evaluated blindfolded in a resourceful cloud. ... In general, there are two types of ABE schemes based on where and Ciphertext-policy (CP-ABE)  . ...arXiv:2007.09270v2 fatcat:7pkdtlnbvrgcnooql642rzd2za