[PDF][PDF] A survey of homomorphic encryption for nonspecialists
C Fontaine, F Galand - EURASIP Journal on Information Security, 2007 - Springer
Processing encrypted signals requires special properties of the underlying encryption
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …
Secure integration of asymmetric and symmetric encryption schemes
E Fujisaki, T Okamoto - Annual international cryptology conference, 1999 - Springer
This paper shows a generic and simple conversion from weak asymmetric and symmetric
encryption schemes into an asymmetric encryption scheme which is secure in a very strong …
encryption schemes into an asymmetric encryption scheme which is secure in a very strong …
Secure integration of asymmetric and symmetric encryption schemes
E Fujisaki, T Okamoto - Journal of cryptology, 2013 - Springer
This paper presents a generic conversion from weak asymmetric and symmetric encryption
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
REACT: Rapid enhanced-security asymmetric cryptosystem transform
T Okamoto, D Pointcheval - Topics in Cryptology—CT-RSA 2001: The …, 2001 - Springer
Seven years after the optimal asymmetric encryption padding (OAEP) which makes chosen-
ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose …
ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose …
Confidentiality and integrity for data aggregation in WSN using homomorphic encryption
Data aggregation is an important method to reduce the energy consumption in wireless
sensor networks (WSNs), however, performing data aggregation while preserving data …
sensor networks (WSNs), however, performing data aggregation while preserving data …
[HTML][HTML] A chaos-based probabilistic block cipher for image encryption
Traditional encryption is based on secrecy provided by secret-key. But this leads to
generation of same cipher text when the encryption scheme is applied to same plaintext with …
generation of same cipher text when the encryption scheme is applied to same plaintext with …
Homomorphic encryption-theory and application
J Sen - Theory and practice of cryptography and network …, 2013 - books.google.com
Thedemandforprivacyofdigitaldataandofalg… have increased exponentially over the last
decade. This goes in parallel with the growth in communication networks and theirdevices …
decade. This goes in parallel with the growth in communication networks and theirdevices …
Secure and private collaborative linear programming
J Li, MJ Atallah - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
The growth of the Internet has created tremendous opportunities for online collaborations.
These often involve collaborative optimizations where the two parties are, for example …
These often involve collaborative optimizations where the two parties are, for example …
Hybrid cryptography
AW Dent - Cryptology ePrint Archive, 2004 - eprint.iacr.org
This paper examines the methods in which the ideas behind a KEM--DEM hybrid encryption
scheme can be extended to other types of asymmetric primitives, particularly to signcryption …
scheme can be extended to other types of asymmetric primitives, particularly to signcryption …
[PDF][PDF] Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
KB Frikken, J Li, MJ Atallah - NDSS, 2006 - ndss-symposium.org
In an open environment such as the Internet, the decision to collaborate with a stranger (eg,
by granting access to a resource) is often based on the characteristics (rather than the …
by granting access to a resource) is often based on the characteristics (rather than the …