Text
Homomorphic encryption and applications
1.Introduction
1.1.Classical Ciphers
1.2.Secret Key Encryption
1.3.Public-Key Encryption
2.Homomorphic Encryption
2.1.Homomorphic Encryption Definition
2.2.Goldwasser-Micali Encryption Scheme
2.3.ElGamal Encryption Scheme
2.4.Paillier Encryption Scheme
2.5.Boneh-Goh-Nissim Encryption Scheme
3.Fully Homomorphic Encryption
3.1.Fully Homomorphic Encryption Definition
3.2.Overview of Fully Homomorphic Encryption Schemes
3.3.Somewhat Homomorphic Encryption Scheme over Integers
3.4.Fully Homomorphic Encryption Scheme over Integers
4.Remote End-to-End Voting Scheme
4.1.Introduction
4.2.Remote End-to-End Voting
4.3.Conclusion and Discussion
5.Nearest Neighbor Queries with Location Privacy
5.1.Introduction
5.2.Private K Nearest Neighbor Queries
5.3.Performance Analysis
5.4.Conclusion and Discussion
6.Private Searching on Streaming Data
6.1.Introduction
6.2.Overview of Private Searching on Streaming Data
6.3.Preliminaries
6.4.Definitions
6.5.Private Threshold Query Based on Keyword Frequency
6.6.Performance Analysis
6.7.Conclusion and Discussion
No other version available