Data Security and Integrity in Multi Cloud

Submitted by: Submitted by

Views: 10

Words: 322

Pages: 2

Category: Science and Technology

Date Submitted: 06/23/2016 05:25 AM

Report This Essay

[1] C. Aguilar-Melchor, S. Fau, C. Fontaine, G. Gogniat, and R. Sirdey.

Recent advances in homomorphic encryption: A possible future for

signal processing in the encrypted domain. IEEE Signal Process. Mag.,

30(2):108–117, 2013.

[2] C. Aguilar-Melchor, P. Gaborit, and J. Herranz. Additively homomorphic

encryption with d-operand multiplications. In CRYPTO’10, volume

6223 of Lecture Notes in Computer Science, pages 138–154. Springer,

2010.

[3] D. Boneh, C. Gentry, S. Halevi, and F. Wang. Private database

queries using somewhat homomorphic encryption. In 11th International

Conference on Applied Cryptography and Network Security - ACNS

2013, 2013.

[4] J. W. Bos, K. Lauter, J. Loftus, and M. Naehrig. Improved security for

a ring-based fully homomorphic encryption scheme. IACR Cryptology

ePrint Archive, 2013:75, 2013.

[5] Z. Brakerski. Fully homomorphic encryption without modulus switching

from classical gapsvp. In CRYPTO, pages 868–886, 2012.

[6] Z. Brakerski, C. Gentry, and V. Vaikuntanathan. (Leveled) fully

homomorphic encryption without bootstrapping. In ITCS, pages 309–

325, 2012.

[7] Z. Brakerski and V. Vaikuntanathan. Fully homomorphic encryption

from ring-LWE and security for key dependent messages. In Advances

in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference,

volume 6841, page 501, 2011.

[8] J.-S. Coron, T. Lepoint, and M. Tibouchi. Batch fully homomorphic

encryption over the integers. IACR Cryptology ePrint Archive, 2013,

2013.

[9] J.-S. Coron, D. Naccache, and M. Tibouchi. Public key compression and

modulus switching for fully homomorphic encryption over the integers.

In David Pointcheval and Thomas Johansson, editors, EUROCRYPT,

volume 7237 of Lecture Notes in Computer Science, pages 446–464.

Springer, 2012.

[10] C. Fontaine and F. Galand. A survey of homomorphic encryption for

nonspecialists. EURASIP J. Inf. Secur., 2007(1):1–15, 2007.

[11] C. Gentry. A fully homomorphic encryption scheme. PhD thesis,

Stanford University, 2009....