A Survey of Homomorphic Encryption for Nonspecialists

A Survey of Homomorphic Encryption for Nonspecialists

ID:41100871

大小:1.09 MB

页数:11页

时间:2019-08-16

A Survey of Homomorphic Encryption for Nonspecialists_第1页
A Survey of Homomorphic Encryption for Nonspecialists_第2页
A Survey of Homomorphic Encryption for Nonspecialists_第3页
A Survey of Homomorphic Encryption for Nonspecialists_第4页
A Survey of Homomorphic Encryption for Nonspecialists_第5页
资源描述:

《A Survey of Homomorphic Encryption for Nonspecialists》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、HindawiPublishingCorporationEURASIPJournalonInformationSecurityVolume2007,ArticleID13801,10pagesdoi:10.1155/2007/13801ReviewArticleASurveyofHomomorphicEncryptionforNonspecialistsCarolineFontaineandFabienGalandCNRS/IRISA-TEMICS,CampusdeBeaulieu,35042RennesCedex,FranceCo

2、rrespondenceshouldbeaddressedtoCarolineFontaine,caroline.fontaine@irisa.frReceived30March2007;Revised10July2007;Accepted24October2007RecommendedbyStefanKatzenbeisserProcessingencryptedsignalsrequiresspecialpropertiesoftheunderlyingencryptionscheme.Apossiblechoiceistheu

3、seofho-momorphicencryption.Inthispaper,weproposeaselectionofthemostimportantavailablesolutions,discussingtheirpropertiesandlimitations.Copyright©2007C.FontaineandF.Galand.ThisisanopenaccessarticledistributedundertheCreativeCommonsAttributionLicense,whichpermitsunrestri

4、cteduse,distribution,andreproductioninanymedium,providedtheoriginalworkisproperlycited.1.INTRODUCTIONmomorphicencryption;itisparticularlyaimedatnoncryp-tographers,providingguidelinesaboutthemaincharacteris-Thegoalofencryptionistoensureconfidentialityofdataticsofencrypti

5、onprimitives:algorithms,performance,secu-incommunicationandstorageprocesses.Recently,itsuserity.Section3providesasurveyofhomomorphicencryptioninconstraineddevicesledtoconsideradditionalfeatures,schemespublishedsofar,andanalysestheircharacteristics.suchastheabilitytodel

6、egatecomputationstountrustedMostschemeswedescribearebasedonmathematicalno-computers.Forthispurpose,wewouldliketogivetheun-tionsthereadermaynotbefamiliarwith.Inthecasesthesetrustedcomputeronlyanencryptedversionofthedatatonotionscaneasilybeintroduced,wepresentthembriefly.

7、process.ThecomputerwillperformthecomputationonthisThereadermayreferto[15]formoreinformationconcern-encrypteddata,hencewithoutknowinganythingonitsrealingthosewecouldnotintroduceproperly,oralgorithmicvalue.Finally,itwillsendbacktheresult,andwewilldecryptproblemsrelatedto

8、theircomputation.it.Forcoherence,thedecryptedresulthastobeequaltotheBeforegoingdeeperinthesubject,letusintroducesomei

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。