Sciweavers

712 search results - page 1 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
ITNG
2006
IEEE
13 years 10 months ago
A Study on the Security of Privacy Homomorphism
Informally, Privacy Homomorphism (PH) refers to encryption schemes with a homomorphic property allowing to obtain Ek(a + b) or Ek(a × b) from ciphertexts Ek(a) and Ek(b) without ...
Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
CSREASAM
2006
13 years 5 months ago
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks
- In this paper we find a secure routing protocol for computer networks, which finds minimum optimum path using homomorphic encryption schemes. We briefly look into the existing ho...
Levent Ertaul, Vaidehi Kedlaya
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
EUROSEC
2008
ACM
13 years 6 months ago
Case study: automated security testing on the trusted computing platform
Gergely Tóth, Gábor Koszegi, Zolt&aa...
CSREASAM
2010
13 years 1 months ago
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
John Barker, Peter Hannay, Christopher Bolan