Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Speeding up secret computations with insecure auxiliary devices
CRYPTO '88 Proceedings on Advances in cryptology
Communications of the ACM
Trust Is not Enough: Privacy and Security in ASP and Web Service Environments
ADBIS '02 Proceedings of the 6th East European Conference on Advances in Databases and Information Systems
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
A Provably Secure Additive and Multiplicative Privacy Homomorphism
ISC '02 Proceedings of the 5th International Conference on Information Security
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
Information Processing Letters
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Anonymous fingerprinting with robust QIM watermarking techniques
EURASIP Journal on Information Security
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
Information Processing Letters
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Black-box extension fields and the inexistence of field-homomorphic one-way permutations
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Symmetric-key homomorphic encryption for encrypted data processing
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Efficient privacy-preserving similar document detection
The VLDB Journal — The International Journal on Very Large Data Bases
On implementation of the Gentry-Halevi somewhat homomorphic scheme
ICCC'11 Proceedings of the 2011 international conference on Computers and computing
Fast query over encrypted character data in database
CIS'04 Proceedings of the First international conference on Computational and Information Science
Security issues in querying encrypted data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
Secure query processing against encrypted XML data using Query-Aware Decryption
Information Sciences: an International Journal
Hi-index | 48.23 |
A severe problem in the processing of encrypted data is that very often, in order to perform arithmetic operations on the data, one has to convert the data back to its nonencrypted origin before performing the required operations. This paper addresses the issue of processing data that have been encrypted while the data are in an encrypted mode. It develops a new approach for encryption models that can facilitate the processing of such data. The advantages of this approach are reviewed, and a basic algorithm is developed to prove the feasibility of the approach.