A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …
[PDF][PDF] A survey of homomorphic encryption for nonspecialists
C Fontaine, F Galand - EURASIP Journal on Information Security, 2007 - Springer
Processing encrypted signals requires special properties of the underlying encryption
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
Order preserving encryption for numeric data
Encryption is a well established technology for protecting sensitive data. However, once
encrypted, data can no longer be easily queried aside from exact matches. We present an …
encrypted, data can no longer be easily queried aside from exact matches. We present an …
Anonymous and secure aggregation scheme in fog-based public cloud computing
H Wang, Z Wang, J Domingo-Ferrer - Future Generation Computer Systems, 2018 - Elsevier
By using fog computing, cloud computing can be extended to the edge of the network.
Generally, in the public cloud, fog computing comprises three components: terminal device …
Generally, in the public cloud, fog computing comprises three components: terminal device …
Protecting mobile agents against malicious hosts
T Sander, CF Tschudin - Mobile agents and security, 1998 - Springer
A key element of any mobile code based distributed system are the security mechanisms
available to protect (a) the host against potentially hostile actions of a code fragment under …
available to protect (a) the host against potentially hostile actions of a code fragment under …
A Provably Secure Additive and Multiplicative Privacy Homomorphism*
J Domingo-Ferrer - International Conference on Information Security, 2002 - Springer
Privacy homomorphisms (PHs) are encryption transformations mapping a set of operations
on cleartext to another set of operations on ciphertext. If addition is one of the ciphertext …
on cleartext to another set of operations on ciphertext. If addition is one of the ciphertext …
Efficient execution of aggregation queries over encrypted relational databases
H Hacıgümüş, B Iyer, S Mehrotra - International Conference on Database …, 2004 - Springer
Encryption is a common method to assure privacy of stored data. In many practical
situations, decrypting data before applying logic compromises privacy. The challenge is to …
situations, decrypting data before applying logic compromises privacy. The challenge is to …
Data protection in outsourcing scenarios: Issues and directions
P Samarati, SDC Di Vimercati - Proceedings of the 5th ACM Symposium …, 2010 - dl.acm.org
Data outsourcing is an emerging paradigm that allows users and companies to give their
(potentially sensitive) data to external servers that then become responsible for their storage …
(potentially sensitive) data to external servers that then become responsible for their storage …
[HTML][HTML] Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
The processing and encryption of multimedia content are generally considered sequential
and independent operations. In certain multimedia content processing scenarios, it is …
and independent operations. In certain multimedia content processing scenarios, it is …