A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Quantum Algorithms for Some Hidden Shift Problems
SIAM Journal on Computing
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
A fully homomorphic encryption scheme
A fully homomorphic encryption scheme
HotPower'10 Proceedings of the 2010 international conference on Power aware computing and systems
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
Forty data communications research questions
ACM SIGCOMM Computer Communication Review
Towards ensuring client-side computational integrity
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Communications of the ACM
Survey: DNA-inspired information concealing: A survey
Computer Science Review
Secure multidimensional range queries over outsourced data
The VLDB Journal — The International Journal on Very Large Data Bases
Reaction attack on outsourced computing with fully homomorphic encryption schemes
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Functional encryption: a new vision for public-key cryptography
Communications of the ACM
Secure and privacy-preserving data services in the cloud: a data centric view
Proceedings of the VLDB Endowment
New approaches to security and availability for cloud data
Communications of the ACM
Protecting data confidentiality in cloud systems
Proceedings of the Fourth Asia-Pacific Symposium on Internetware
Privacy and anonymity in untrusted data stores
ADC '11 Proceedings of the Twenty-Second Australasian Database Conference - Volume 115
Secure database-as-a-service with Cipherbase
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Enabling secure query processing in the cloud using fully homomorphic encryption
Proceedings of the Second Workshop on Data Analytics in the Cloud
Cloud Computing Operations Research
Service Science
Efficient and secure data storage operations for mobile cloud computing
Proceedings of the 8th International Conference on Network and Service Management
New methods of secure outsourcing of scientific computations
The Journal of Supercomputing
MrCrypt: static analysis for secure cloud computations
Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications
Trends and research directions for privacy preserving approaches on the cloud
Proceedings of the 6th ACM India Computing Convention
Symmetric quantum fully homomorphic encryption with perfect security
Quantum Information Processing
An efficient privacy-preserving solution for finding the nearest doctor
Personal and Ubiquitous Computing
Hi-index | 48.26 |
Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a worker that does not have the secret decryption key to compute any (still encrypted) result of the data, even when the function of the data is very complex. In short, a third party can perform complicated processing of data without being able to see it. Among other things, this helps make cloud computing compatible with privacy.