Open Access

Cryptanalysis of Enhanced More


Cite

[1] BRAKERSKI, Z.—VAIKUNTANATHAN, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Proceedings of the 31st annual conference on Advances in cryptology, CRYPTO’11, Springer-Verlag, Berlin, 2011. pp. 505–524,Search in Google Scholar

[2] CHAN, A. C.-F.: Symmetric-key homomorphic encryption for encrypted data processing. In: Proceedings of the 2009 IEEE international conference on Communications, ICC’09, IEEE Press, Piscataway, NJ, USA, 2009, pp. 774–778.Search in Google Scholar

[3] FAN, J.—VERCAUTEREN, F.: Somewhat Practical Fully Homomorphic Encryption, IACR Cryptology, ePrint Archive (2012/144).Search in Google Scholar

[4] GENTRY, C.: A fully homomorphic encryption scheme. PhD Thesis, Stanford, CA, USA, 2009; AAI3382729.10.1145/1536414.1536440Search in Google Scholar

[5] HARISS, K.—NOURA, H.—SAMHAT, A. E.: Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications, J. Inf. Sec. Appl. 34 (2017), 233–242.Search in Google Scholar

[6] KIPNIS, A.—HIBSHOOSH, E.: Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification, IACR Cryptology ePrint Archive (2012/637).Search in Google Scholar

[7] NOURA, H.—COUROUSSÉ, D.: HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network, IACR Cryptology ePrint Archive (2015/928).Search in Google Scholar

[8] PAILLIER, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology—EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2–6, 1999, Proceeding Lecture Notes in Computer Science Vol. 1592 (J. Stern, ed.), Springer-Verlag, Berlin, 1999. pp. 223–238.Search in Google Scholar

[9] RIVEST, R. L.—ADLEMAN, L.—DERTOUZOS, M. L.: On data banks and privacy homomorphisms,In: Foundations of Secure Computation, (Workshop, Georgia Inst. Tech., Atlanta, Ga., 1977) Academia Press, New York, 1978, pp. 169–179.Search in Google Scholar

[10] STEIN, W. et al.: Sage Mathematics Software (Version 6.8). The Sage Development Team, 2015. http://www.sagemath.orgSearch in Google Scholar

[11] VAN DIJK, M.—GENTRY, C.—HALEVI, S.—VAIKUNTANATHAN, V.: Fully homomorphic encryption over the integers. In: EUROCRYPT 2010, pp. 24–43.10.1007/978-3-642-13190-5_2Search in Google Scholar

[12] VIZÁR, D.—VAUDENAY, S.: Cryptanalysis of chosen symmetric homomorphic schemes, Studia Scientiarum Mathematicarum Hungarica 52 (2015), 288–306.10.1556/012.2015.52.2.1311Search in Google Scholar

[13] XIAO, L.—BASTANI, O.—YEN, I.-L.: An Efficient Homomorphic Encryption Protocol for Multi-User Systems, IACR Cryptology ePrint Archive (2012/193) (informal publication).Search in Google Scholar

eISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics