Filters








2,622 Hits in 2.4 sec

Targeted Homomorphic Attribute-Based Encryption [chapter]

Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
2016 Lecture Notes in Computer Science  
This would require homomorphic attribute based encryption (HABE).  ...  In (key-policy) attribute based encryption (ABE), messages are encrypted respective to attributes x, and keys are generated respective to policy functions f .  ...  A Targeted Homomorphic Attribute Based Encryption (T-HABE) scheme is a tuple of ppt algorithms THABE = (Setup, Enc, Keygen, TEval, Dec) with the following syntax: • THABE.Setup(1 λ ) takes as input the  ... 
doi:10.1007/978-3-662-53644-5_13 fatcat:qun37k4q55db3d3xrphrln2tyi

Targeted fully homomorphic encryption based on a Double Decryption Algorithm for polynomials

Yatao Yang, Shuang Zhang, Junming Yang, Jia Li, Zichen Li
2014 Tsinghua Science and Technology  
A new targeted fully homomorphic encryption scheme based on the discrete logarithm problem is presented. Public-key encryption cryptosystems are classified to examine homomorphic encryption.  ...  Algorithm" is employed in our cryptography to satisfy a fully or targeted fully homomorphic property.  ...  On this basis, a new targeted fully homomorphic encryption scheme is proposed.  ... 
doi:10.1109/tst.2014.6919824 fatcat:bstksd2645bipelcjj3rzgunw4

Bootstrappable Identity-Based Fully Homomorphic Encryption [chapter]

Michael Clear, Ciarán McGoldrick
2014 Lecture Notes in Computer Science  
Our attribute-based scheme is the first to support homomorphic evaluation on ciphertexts with different attributes.  ...  It has been an open problem for a number of years to construct an identity-based fully homomorphic encryption (IBFHE) scheme (first mentioned by Naccache at CHES/CRYPTO 2010).  ...  We would like to especially thank one of the reviewers for suggesting an improvement to the attribute-based construction in Section 3.1 in addition to suggesting interesting directions for future work.  ... 
doi:10.1007/978-3-319-12280-9_1 fatcat:sajo7ysvovgvnm5r33hvstwewe

Homomorphic Encryption with Access Policies: Characterization and New Constructions [chapter]

Michael Clear, Arthur Hughes, Hitesh Tewari
2013 Lecture Notes in Computer Science  
Our main construction is an XOR-homomorphic IBE scheme based on the quadratic residuosity problem (variant of the Cocks' scheme), which we show to be strongly homomorphic.  ...  A characterization of predicate encryption (PE) with support for homomorphic operations is presented and we describe the homomorphic properties of some existing PE constructions.  ...  Conclusions and Future Work We have presented a characterization of homomorphic encryption in the PE setting and classified schemes based on the properties of their attribute homomorphisms.  ... 
doi:10.1007/978-3-642-38553-7_4 fatcat:jdbgof47ozcafhnxpihfzgrmzi

Homomorphic-Encryption-Based Separation Approach for Outsourced Data Management [chapter]

Yang Zhang, Jun-Liang Chen
2013 Lecture Notes in Computer Science  
We propose a separation approach based on homomorphic encryption to realize outsourced data management, where an encryption procedure is separated from authorization, and dynamically integrated with authorization  ...  policy according to subjects' attributes at any time.  ...  Separation based on encryption homomorphism encryption techniques instead of the legal protection offered by contracts when enforcing access control, i.e. the data owner encrypts data, sends ciphertexts  ... 
doi:10.1007/978-3-642-37804-1_4 fatcat:ycmyyqpuczcebpjmg4ipxivrqi

Survey on Emerging Security Mechanisms for Medical Cyber Physical Systems

Anupama C V, Misha Ravi
2017 International Journal Of Engineering And Computer Science  
Index Terms-Medical cyber physical systems, medical data privacy, homomorphic encryption, attribute-based encryption  ...  Also, emerging encryption technology such as homomorphic encryption standards used in MCPS.  ...  Here develop a new cryptosystem for fine-grained sharing of encrypted data,it is called Key-Policy Attribute-Based Encryption (KP-ABE).  ... 
doi:10.18535/ijecs/v6i2.06 fatcat:4gtyoa2qvvgszkog7ruleyrjri

Homomorphic Encryption for Secure Computation on Big Data

Roger A. Hallman, Mamadou H. Diallo, Michael A. August, Christopher T. Graves
2018 Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security  
Homomorphic Encryption (HE) is a method of secure computation which allows for calculations to be made on encrypted data without decrypting it and without giving away information about the operations being  ...  mobile devices and the emergence of Internet of Things (IoT) technologies, most of our activities contribute to ever-growing data sets which are used for big data analytics for a variety of uses, from targeted  ...  ., 2017) demonstrated GPGPU-based optimization. The CUDA Homomorphic Encryption Library has further pursued GPGPU-based HE optimization (Dai and Sunar, 2015) .  ... 
doi:10.5220/0006823203400347 dblp:conf/iotbd/HallmanDAG18 fatcat:lrnpccq3srf45dr7zprua5xjk4

PRIVACY PRESERVING LOCATION BASED SERVICES QUERY SCHEME BASED ON FULLY HOMOMORPHIC ENCRYPTION

FIFI FAROUK, YASMIN ALKADY, RAWYA RIZK
2021 Zenodo  
Aiming at the challenges, in this paper, we present a new efficient Privacy Preserving LBS Query scheme based on Fully Homomorphic Encryption (PPQ_FHE).  ...  Specifically, based on improving FHE over Advanced Encryption Standard (AES). We provide a security analysis to show that PPQ_FHE scheme preserves privacy in the presence of different threats.  ...  So, there are two basic problems that should be solved in a cloud-based LBS application over the outsourced encrypted location data: 1) How to find out all target locations over the encrypted location  ... 
doi:10.5281/zenodo.5393261 fatcat:a3leinfljzcbfcx36wt37uu6s4

Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based [chapter]

Craig Gentry, Amit Sahai, Brent Waters
2013 Lecture Notes in Computer Science  
Using similar techniques, we show how to compile a recent attribute-based encryption scheme for circuits by Gorbunov et al. into an attribute-based FHE scheme that permits data encrypted under the same  ...  We describe a comparatively simple fully homomorphic encryption (FHE) scheme based on the learning with errors (LWE) problem.  ...  Identity-Based and Attribute-Based Homomorphic Encryption In a homomorphic encryption scheme HE = (KeyGen, Enc, Dec, Eval), the message space is some ring, and Eval homomorphically evaluates arithmetic  ... 
doi:10.1007/978-3-642-40041-4_5 fatcat:fqwzglav2fhy7olktxlob536jq

Cloud Based Reasoning Health Data using Homomorphic Encryption

2020 International journal of recent technology and engineering  
Computations are performed over this encrypted data using decision tree algorithm. The results are displayed on the client machine.  ...  In this system, the data is encrypted using paillier cryptosystem before outsourcing, which preserves the privacy of patient's health data.  ...  On the encrypted text, calculate the target entropy. Then the dataset is split based on various attributes.  ... 
doi:10.35940/ijrte.f9263.059120 fatcat:jm6pxke4nfakrbj3xi5m3lhyfi

Privacy-Preserving Clustering Using Representatives over Arbitrarily Partitioned Data

Yu Li, Sheng Zhong
2013 International Journal of Advanced Computer Science and Applications  
With the development of this technique, fully homomorphic encryption has been realized after decades of research; this encryption enables the computing and obtaining results via encrypted data without  ...  In this paper, we propose a privacy-preserving clustering using representatives (CURE) algorithm over arbitrarily partitioned data using fully homomorphic encryption.  ...  All of these privacy-preserving algorithms are based on either additively homomorphic encryption or multiplicatively homomorphic encryption.  ... 
doi:10.14569/ijacsa.2013.040932 fatcat:qlehglbnpjaqznauhs4oghrq6m

Acceleration of Homomorphic Arithmetic Processing Based on the ElGamal Cryptosystem

Takuma Jogan, Tomofumi Matsuzawa, Masayuki Takeda
2019 Communications and Network  
Among the different types of cryptosystems, fully homomorphic encryption can perform arbitrary homomorphic addition and multiplication, but it takes a long time to eliminate the limitation on the number  ...  The results of experiments comparing with the proposed method with HElib in which the BGV scheme of fully homomorphic encryption is implemented showed that, although the processing time for homomorphic  ...  As a comparison target, HElib on which the BGV We measure the processing time of homomorphic addition and homomorphic multiplication.  ... 
doi:10.4236/cn.2019.111001 fatcat:5una2uunyje7ffazgxodwpefea

A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud

Mahmoud Fahsi, Sidi Mohamed Benslimane, Amine Rahmani
2015 International Journal of Modern Education and Computer Science  
Attributes Based Encryption (ABE). This type of PBE uses a set of attributes to generate secret keys, where the attributes do not necessarily correspond to the user entity.  ...  Although many PIR protocol implementations exist in the literature [5] , we will use the homomorphic PIR protocol, based on asymmetric encryption [6] .  ... 
doi:10.5815/ijmecs.2015.05.03 fatcat:3ei77nbccbapfeq7zxyazlhxba

Privacy-Preserving Internet of Things: Techniques and Applications

2019 International Journal of Engineering and Advanced Technology  
The techniques like k-anonymity, secure multiparty computation, attribute based encryption and homomorphic encryption are analyzed.  ...  A large number of techniques and approaches have been implemented and used in different IoT based applications such as cloud computing based IoT, fog computing based IoT, blockchain based IoT and trajectory  ...  Such as k-anonymity technique, secure multi-party computation, attribute based encryption and homomorphic encryption techniques.  ... 
doi:10.35940/ijeat.f8830.088619 fatcat:onkuoapbkzhdtggza6ib7jj5ka

Revolutionizing Medical Data Sharing Using Advanced Privacy-Enhancing Technologies: Technical, Legal, and Ethical Synthesis

James Scheibner, Jean Louis Raisaro, Juan Ramón Troncoso-Pastoriza, Marcello Ienca, Jacques Fellay, Effy Vayena, Jean-Pierre Hubaux
2021 Journal of Medical Internet Research  
This paper provides a synthesis between 2 novel advanced privacy-enhancing technologies-homomorphic encryption and secure multiparty computation (defined together as multiparty homomorphic encryption).  ...  These privacy-enhancing technologies provide a mathematical guarantee of privacy, with multiparty homomorphic encryption providing a performance advantage over separately using homomorphic encryption or  ...  This membership information can be subsequently used to infer sensitive and sometimes stigmatizing attributes of the target individuals.  ... 
doi:10.2196/25120 pmid:33629963 pmcid:PMC7952236 fatcat:j4usj6ihandkznrqmj36qwhlbi
« Previous Showing results 1 — 15 out of 2,622 results