Homomorphic Encryption Using Enhanced BGV Encryption Scheme For Cloud Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Field switching in BGV-style homomorphic encryption

The security of contemporary homomorphic encryption schemes over cyclotomic number field relies on fields of very large dimension. This large dimension is needed because of the large modulus-tonoise ratio in the key-switching matrices that are used for the top few levels of the evaluated circuit. However, larger noise (and hence smaller modulus-to-noise ratio) is used in lower levels of the cir...

متن کامل

Ring Switching in BGV-Style Homomorphic Encryption

BGV-style homomorphic encryption schemes over polynomial rings, rely for their security on rings of very large dimension. This large dimension is needed because of the large modulus-to-noise ratio in the key-switching matrices that are used for the top few levels of the evaluated circuit. However, larger noise (and hence smaller modulus-to-noise ratio) is used in lower levels of the circuit, so...

متن کامل

Towards Secure the Multi-Cloud using Homomorphic Encryption Scheme

Cloud computing is a model to acces shared pool of configurable computing resources which include servers, storage, applications, and also services to network effort or service interaction provider . This cloud model promotes availability and is composed of five essential fetures, in that service models are three, and four are deployment models. However, as the shape of the cloud computing is e...

متن کامل

Securing Data in Cloud Using Homomorphic Encryption

Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentica...

متن کامل

Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme

In 1996, Hoffstein, Pipher and Silverman introduced an efficient lattice based encryption scheme dubbed NTRUEncrypt. Unfortunately, this scheme lacks a proof of security. However, in 2011, Stehlé and Steinfeld showed how to modify NTRUEncrypt to reduce security to standard problems in ideal lattices. In 2012, López-Alt, Tromer and Vaikuntanathan proposed a fully homomorphic scheme based on this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal Of Engineering And Computer Science

سال: 2018

ISSN: 2319-7242

DOI: 10.18535/ijecs/v7i3.22