Filters








4,096 Hits in 2.8 sec

Secure Fully Homomorphic Authenticated Encryption

Jeongsu Kim, Aaram Yun
2021 IEEE Access  
We combine a fully homomorphic encryption and two homomorphic authenticators, one fully homomorphic and one OR-homomorphic, to construct a fully homomorphic authenticated encryption that satisfies our  ...  In this work, we propose a new security notion and the first construction of fully homomorphic authenticated encryption.  ...  Citation information: DOI 10.1109/ACCESS.2021.3100852, IEEE Access Jeongsu Kim and Aaram Yun: Secure Fully Homomorphic Authenticated Encryption 1) Homomorphic authenticated encryption • c ← Enc(sk ,  ... 
doi:10.1109/access.2021.3100852 fatcat:v6gaczdjlncm5lpynnwpo6wk7e

Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption

Taeyun Kim, Yongwoo Oh, Hyoungshick Kim
2020 Security and Communication Networks  
We implement a fully working fingerprint authentication system with a fingerprint database (containing 4,000 samples) using the Fast Fully Homomorphic Encryption over the Torus (TFHE) library.  ...  In this paper, we present an efficient privacy-preserving fingerprint authentication system using a fully homomorphic encryption scheme in which fingerprint data are always stored and processed in an encrypted  ...  Fully homomorphic encryption scheme was first proposed by Gentry [9] .  ... 
doi:10.1155/2020/4195852 fatcat:7a54ead3rzezvad5s4uw76dd3e

Verifiable Computation on Outsourced Encrypted Data [chapter]

Junzuo Lai, Robert H. Deng, Hweehwa Pang, Jian Weng
2014 Lecture Notes in Computer Science  
We first introduce a new cryptographic primitive called homomorphic encrypted authenticator (HEA), which may be of independent interest.  ...  Since cloud servers are usually operated by thirdparty providers which are almost certain to be outside the trust domain of cloud users, neither homomorphic encryption nor homomorphic authenticator suffices  ...  That is, the fully homomorphic authenticator proposed in [13] is also semantically secure.  ... 
doi:10.1007/978-3-319-11203-9_16 fatcat:dxuhpdsk4rfzth27joef5e7kp4

A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds

Karim Zkik, Maha Tebaa, Tarik Tachihante, Ghizlane Orhanou
2017 Journal of Computer Science  
So, This paper proposes a framework for Authentication and Homomorphic Encryption (A-HEaaS) based on security as a Service model which permits a secure access to the Cloud servers and the use of homomorphic  ...  The main idea of this paper it's to propose a new security model to preserving user's privacy using homomorphic encryption while bypassing its limitations.  ...  Somewhat/Fully Homomorphic Encryption The purpose of homomorphic encryption is to allow computation on encrypted data (Rivest, 2002) .  ... 
doi:10.3844/jcssp.2017.702.717 fatcat:wljutbs2avegjnipvbcyyybiya

Using Homomorphic Cryptographic Solutions on E-voting Systems

Ahmed A. Abu Aziz, Hasan N.Qunoo, Aiman A. Abu Samra
2018 International Journal of Computer Network and Information Security  
The purpose of the study is to examine the applicability of Fully Homomorphic encryption in real systems and to evaluate the performance of fully homomorphic encryption in evoting systems.  ...  Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this research, Fully Homomorphic encryption used to design and implement an e-voting system.  ...  Fig. 1 . 1 Homomorphic Encryption EvaluationB. Fully Homomorphic Encryption Scheme .J. Computer Network and Information Security, 2018, 1, 44-59 Copyright © 2018 MECS I.J.  ... 
doi:10.5815/ijcnis.2018.01.06 fatcat:yktqnqilljhejlrpjcbl5wxmzy

A Full Homomorphic Message Authenticator with Improved Efficiency

Wenbin Chen, Hao Lei
2014 International Journal of Computer and Communication Engineering  
Index Terms-Fully homomorphic message authenticators, fully homomorphic encryption, cloud security.  ...  Recent, Gennaro and Wichs use a fully homomorphic encryption to construct a fully homomorphic message authenticator.  ...  (Fully Homomorphic Encryption [11] ).  ... 
doi:10.7763/ijcce.2014.v3.334 fatcat:gflpvd2gibetfkc5ssevbpx6um

Computations on Cipher Speech for Secure Biometrics

Archana Dinesh, K. Edet Bijoy
2016 Procedia Computer Science  
The test results with AES ciphers and RSA ciphers with secure authentication protocols SIP and SIS are detailed in this paper.  ...  Here we have tested the proposed system with Advanced Encryption Standard (AES) ciphers and Rivest, Shamir and Adleman (RSA) ciphers with secure signal processing protocols like Secure Inner Product (SIP  ...  All existing fully homomorphic encryption schemes were developed from the Gentry's method.  ... 
doi:10.1016/j.procs.2016.07.293 fatcat:omf5hszhobbthjdnjrhl66unfi

An Analysis of Third Party Auditing Techniques in Cloud Computing
IJARCCE - Computer and Communication Engineering

RAMYA. D, DR.RAJA. K, SRINIVASAN. S
2014 IJARCCE  
A method that uses the keyed Hash Message Authentication Code (HMAC) with the Homomorphic encryption to enhance the security of TPA.  ...  Cloud storage supports to maintain data securely in cloud. To enhance data correctness of cloud, auditing is done by Third Party Auditor (TPA).  ...  And Homomorphic encryption is used for security purpose. The following section (v) and (vi) describes about working functions of Hash based message authentication code and Homomorphic encryption.  ... 
doi:10.17148/ijarcce.2014.31134 fatcat:fc2d2mufp5cmrlalrs4fcfklbq

Cloud Auditing: Privacy Preserving using Fully Homomorphic Encryption in TPA

Shivani Gambhir, Ajay Rawat, Rama Sushil
2013 International Journal of Computer Applications  
In proposed scheme, existing fully homomorphic encryption is integrated with TPA auditing system is proposed. This scheme can audit data integrity without decrypting it.  ...  In this paper, the problem of data security and integrity has been presented. Also, a scheme to provide maximum data integrity.  ...  CONCLUSION In this paper we propose fully homomorphic encryption auditing system for the data storage security in the cloud computing.  ... 
doi:10.5120/13929-1869 fatcat:aaxmkwtr6fgyjho3uyqdfiguk4

A SURVEY OF HOMOMORPHIC ENCRYPTION OF DATA IN CLOUD FOR SECURE STORAGE

S. Gnana Sophia, K.K Thanammal And S SSujatha
2021 Zenodo  
In this paper wereviewe the homomorphic encryption techniques, Advantages and disadvantages of various research papers.  ...  Loss of security in the cloud is an important problem.  ...  Fully Homomorphic Encryption (FHE): The functionality is more with isolation to carry information secure and available at the time of same .  ... 
doi:10.5281/zenodo.5166891 fatcat:olzgoycipfdwnce4iwl6vfkopu

SECURED DATA AGGREGATION METHODS IN WIRELESS SENSOR NETWORKS USING HOMOMORPHIC OPERATION - A REVIEW

Shahina K, Vaidehi Vijayakumar
2017 Asian Journal of Pharmaceutical and Clinical Research  
Homomorphic encryption is one of such technique. In homomorphic encryption, all the nodes participate in the aggregation.  ...  Secured data aggregation in sensor network is a topic of research. Many solutions are proposed for secured data aggregation, using different encryption methods.  ...  and efficient aggregation using stateful public key cryptography, SDA-HP: Secured data aggregation with homomorphic primitives, FESA: Secured data aggregation with fully homomorphic encryption, MAC  ... 
doi:10.22159/ajpcr.2017.v10s1.19749 fatcat:friwg5yqf5apjkcblcpma6zayy

MULTI-FACTOR AUTHENTICATION USING A NOVEL APPROACH IN THE CLOUD

S. Meena
2017 International Journal of Advanced Research in Computer Science  
The solution aims at gaining confidentiality and integrity by making use of CP-ABHE (Ciphertext Policy-Attribute based Homomorphic Encryption algorithm) and user verification with Multi-Factor Authentication  ...  Conventionally used authentication methods are rather securing data, but not smart enough and completely secured.  ...  Then the fully homomorphic encryption process is used to provide the security of the stored data in the cloud server.  ... 
doi:10.26483/ijarcs.v8i7.4566 fatcat:itqvg74ebvharfjnavtfjhduge

Token-Based Cloud Computing [chapter]

Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy
2010 Lecture Notes in Computer Science  
Pure cryptographic solutions based on fully homomorphic and verifiable encryption, recently proposed, are promising but suffer from very high latency.  ...  Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important.  ...  Fully Homomorphic Encryption Fully homomorphic encryption is semantically secure public-key encryption that additionally allows computing an arbitrary function on encrypted data using [12] and subsequent  ... 
doi:10.1007/978-3-642-13869-0_30 fatcat:3oznhjtda5atdp4dxjvkdy2o7i

Fully Homomorphic Message Authenticators [chapter]

Rosario Gennaro, Daniel Wichs
2013 Lecture Notes in Computer Science  
Our construction relies on fully homomorphic encryption to build fully homomorphic message authenticators.  ...  We define and construct a new primitive called a fully homomorphic message authenticator.  ...  In particular, a prior version of this work included a speculative suggestion for achieving security with verification queries via "randomness-homomorphic encryption"; Craig pointed out that this latter  ... 
doi:10.1007/978-3-642-42045-0_16 fatcat:rkgk3xohznanjib6u54ntpnfvm

Secure Face Matching Using Fully Homomorphic Encryption [article]

Vishnu Naresh Boddeti
2018 arXiv   pre-print
In this paper, we explore the practicality of using a fully homomorphic encryption based framework to secure a database of face templates.  ...  As we witness the widespread adoption of these systems, it is imperative to consider the security of face representations.  ...  Figure 2 : 2 Enrollment and authentication protocols for secure face matching using fully homomorphic encryption.  ... 
arXiv:1805.00577v2 fatcat:cr5nqphj5jdllfz6shlqy5sfxi
« Previous Showing results 1 — 15 out of 4,096 results