Advanced Homomorphic Encryption for Cloud Data Security
DOI: http://dx.doi.org/10.30630/joiv.1.1.11
Abstract
Keywords
Full Text:
PDFReferences
Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem G.N. Shinde and H.S. Fadewar , ICCES, vol.5, no.4, pp.255-261.
C. Lamprecht “Investigating the efficiency of Cryptographic algorithm in Online Transactionâ€ISN 1473-804X online, 1473-8031 I.J. of Simulation Vol.7, No.2.
AlexanderMay, “Cryptanalysis of Unbalanced RSA with Small CRT-Exponentâ€, CRYPTO 2002, LNCS 2442, pp 242-256, 2002.
JohannnesBlomer,Martin Otto, “a newCRT-RSA Algorithm Secure Against Bellcoreâ€, CC’03, October 27-30,Washington, DC, USA.
Craig Gentry, A Fully Homomorphic Encryption Scheme,2009.
http://crypto.stanford.edu/craig/craig-thesis.pdf.
Understanding Homomorphic Encryption http://en.wikipedia.org/wiki/Homomorphic_encryption.
Homomorphic Encryption Applied to the Cloud Computing Security Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI.
Vic (J.R.) Winkler, â€Securing the Cloud, Cloud Computer Security, Techniques and Tacticsâ€, Elsevier.
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
A Fully Homomorphic Encryption Implementation on Cloud Computing Shashank Bajpai and Padmija Srivastava Cloud Computing Research Team, Center for Development of Advanced Computing [C-DAC], Hyderabad.