[PDF][PDF] A survey of homomorphic encryption for nonspecialists

C Fontaine, F Galand - EURASIP Journal on Information Security, 2007 - Springer
Processing encrypted signals requires special properties of the underlying encryption
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …

Secure integration of asymmetric and symmetric encryption schemes

E Fujisaki, T Okamoto - Annual international cryptology conference, 1999 - Springer
This paper shows a generic and simple conversion from weak asymmetric and symmetric
encryption schemes into an asymmetric encryption scheme which is secure in a very strong …

Secure integration of asymmetric and symmetric encryption schemes

E Fujisaki, T Okamoto - Journal of cryptology, 2013 - Springer
This paper presents a generic conversion from weak asymmetric and symmetric encryption
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …

REACT: Rapid enhanced-security asymmetric cryptosystem transform

T Okamoto, D Pointcheval - Topics in Cryptology—CT-RSA 2001: The …, 2001 - Springer
Seven years after the optimal asymmetric encryption padding (OAEP) which makes chosen-
ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose …

Confidentiality and integrity for data aggregation in WSN using homomorphic encryption

SB Othman, AA Bahattab, A Trad, H Youssef - Wireless Personal …, 2015 - Springer
Data aggregation is an important method to reduce the energy consumption in wireless
sensor networks (WSNs), however, performing data aggregation while preserving data …

[HTML][HTML] A chaos-based probabilistic block cipher for image encryption

S Dhall, SK Pal, K Sharma - Journal of King Saud University-Computer and …, 2022 - Elsevier
Traditional encryption is based on secrecy provided by secret-key. But this leads to
generation of same cipher text when the encryption scheme is applied to same plaintext with …

Homomorphic encryption-theory and application

J Sen - Theory and practice of cryptography and network …, 2013 - books.google.com
Thedemandforprivacyofdigitaldataandofalg… have increased exponentially over the last
decade. This goes in parallel with the growth in communication networks and theirdevices …

Secure and private collaborative linear programming

J Li, MJ Atallah - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
The growth of the Internet has created tremendous opportunities for online collaborations.
These often involve collaborative optimizations where the two parties are, for example …

Hybrid cryptography

AW Dent - Cryptology ePrint Archive, 2004 - eprint.iacr.org
This paper examines the methods in which the ideas behind a KEM--DEM hybrid encryption
scheme can be extended to other types of asymmetric primitives, particularly to signcryption …

[PDF][PDF] Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.

KB Frikken, J Li, MJ Atallah - NDSS, 2006 - ndss-symposium.org
In an open environment such as the Internet, the decision to collaborate with a stranger (eg,
by granting access to a resource) is often based on the characteristics (rather than the …