Communications of the ACM
A new privacy homomorphism and applications
Information Processing Letters
Multi-application smart cards and encrypted data processing
Future Generation Computer Systems - Special issue on smart cards
An implementable scheme for secure delegation of computing and data
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
Information Processing Letters
IEEE Transactions on Mobile Computing
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
CORA: Correlation-based resilient aggregation in sensor networks
Ad Hoc Networks
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure data aggregation with multiple encryption
EWSN'07 Proceedings of the 4th European conference on Wireless sensor networks
PPIDS: privacy preserving intrusion detection system
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Black-box extension fields and the inexistence of field-homomorphic one-way permutations
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Symmetric-key homomorphic encryption for encrypted data processing
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure encrypted-data aggregation for wireless sensor networks
Wireless Networks
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Additively homomorphic encryption with d-operand multiplications
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Coordinate transformation - a solution for the privacy problem of location based services?
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A security framework for privacy-preserving data aggregation in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
Journal of Systems and Software
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Privacy homomorphism for delegation of the computations
NEW2AN'06 Proceedings of the 6th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Secure Distributed Data Aggregation
Foundations and Trends in Databases
Private computation of spatial and temporal power consumption with smart meters
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
On the privacy of concealed data aggregation
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Provable Security for Outsourcing Database Operations
International Journal of Information Security and Privacy
Lossy data aggregation integrity scheme in wireless sensor networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Privacy homomorphisms (PHs) are encryption transformations mapping a set of operations on cleartext to another set of operations on ciphertext. If addition is one of the ciphertext operations, then it has been shown that a PH is insecure against a chosen-cleartext attack. Thus, a PH allowing full arithmetic on encrypted data can be at best secure against known-cleartext attacks. We present one such PH (none was known so far) which can be proven secure against known-cleartext attacks, as long as the ciphertext space is much larger than the cleartext space. Some applications to delegation of sensitive computing and data and to e-gambling are briefly outlined.