Homomorphic Encryption Using Enhanced BGV Encryption Scheme For Cloud Security
نویسندگان
چکیده
منابع مشابه
Field switching in BGV-style homomorphic encryption
The security of contemporary homomorphic encryption schemes over cyclotomic number field relies on fields of very large dimension. This large dimension is needed because of the large modulus-tonoise ratio in the key-switching matrices that are used for the top few levels of the evaluated circuit. However, larger noise (and hence smaller modulus-to-noise ratio) is used in lower levels of the cir...
متن کاملRing Switching in BGV-Style Homomorphic Encryption
BGV-style homomorphic encryption schemes over polynomial rings, rely for their security on rings of very large dimension. This large dimension is needed because of the large modulus-to-noise ratio in the key-switching matrices that are used for the top few levels of the evaluated circuit. However, larger noise (and hence smaller modulus-to-noise ratio) is used in lower levels of the circuit, so...
متن کاملTowards Secure the Multi-Cloud using Homomorphic Encryption Scheme
Cloud computing is a model to acces shared pool of configurable computing resources which include servers, storage, applications, and also services to network effort or service interaction provider . This cloud model promotes availability and is composed of five essential fetures, in that service models are three, and four are deployment models. However, as the shape of the cloud computing is e...
متن کاملSecuring Data in Cloud Using Homomorphic Encryption
Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentica...
متن کاملImproved Security for a Ring-Based Fully Homomorphic Encryption Scheme
In 1996, Hoffstein, Pipher and Silverman introduced an efficient lattice based encryption scheme dubbed NTRUEncrypt. Unfortunately, this scheme lacks a proof of security. However, in 2011, Stehlé and Steinfeld showed how to modify NTRUEncrypt to reduce security to standard problems in ideal lattices. In 2012, López-Alt, Tromer and Vaikuntanathan proposed a fully homomorphic scheme based on this...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal Of Engineering And Computer Science
سال: 2018
ISSN: 2319-7242
DOI: 10.18535/ijecs/v7i3.22