Publications

Detailed Information

Introduction to Homomorphic Encryption and Schemes

DC Field Value Language
dc.contributor.authorCheon, Jung Hee-
dc.contributor.authorCostache, Anamaria-
dc.contributor.authorMoreno, Radames Cruz-
dc.contributor.authorDai, Wei-
dc.contributor.authorGeorgieva, Mariya-
dc.contributor.authorHalevi, Shai-
dc.contributor.authorKim, Miran-
dc.contributor.authorKim, Sunwoong-
dc.contributor.authorLaine, Kim-
dc.contributor.authorGama, Nicolas-
dc.contributor.authorPolyakov, Yuriy-
dc.contributor.authorSong, Yongsoo-
dc.date.accessioned2024-05-08T06:36:56Z-
dc.date.available2024-05-08T06:36:56Z-
dc.date.created2023-06-19-
dc.date.issued2022-07-
dc.identifier.citationSpringer Monographs in Mathematics, pp.3-28-
dc.identifier.issn1439-7382-
dc.identifier.urihttps://hdl.handle.net/10371/201194-
dc.description.abstractHomomorphic encryption (HE) enables processing encrypted data without decrypting it. This technology can be used, for example, to allow a public cloud to operate on secret data without the cloud learning anything about the data. Simply encrypt the secret data with homomorphic encryption before sending it to the cloud, have the cloud process the encrypted data and return the encrypted result, and finally decrypt the encrypted result. Here is a simplistic "hello world" example using homomorphic encryption.-
dc.language영어-
dc.publisherSpringer Science + Business Media-
dc.titleIntroduction to Homomorphic Encryption and Schemes-
dc.typeArticle-
dc.identifier.doi10.1007/978-3-030-77287-1_1-
dc.citation.journaltitleSpringer Monographs in Mathematics-
dc.identifier.scopusid2-s2.0-85164442291-
dc.citation.endpage28-
dc.citation.startpage3-
dc.description.isOpenAccessN-
dc.contributor.affiliatedAuthorCheon, Jung Hee-
dc.contributor.affiliatedAuthorSong, Yongsoo-
dc.type.docType기타-
dc.description.journalClass1-
Appears in Collections:
Files in This Item:
There are no files associated with this item.

Related Researcher

  • College of Engineering
  • Dept. of Computer Science and Engineering
Research Area Cryptography, Privacy, Security

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share