Parallelizing fully homomorphic encryption for a cloud environment

R Hayward, CC Chiang - Journal of applied research and technology, 2015 - scielo.org.mx
Cloud computing is a boon for both business and private use, but data security concerns
slow its adoption. Fully homomorphic encryption (FHE) offers the means by which the cloud …

Parallelizing fully homomorphic encryption

R Hayward, CC Chiang - 2014 International Symposium on …, 2014 - ieeexplore.ieee.org
As cloud computing has grown increasingly prevalent, the privacy of data on the cloud
becomes an issue. Encryption is an effective way to enforce data privacy. However most of …

[PDF][PDF] 密码芯片的多算法随机作业流调度方法

李莉, 史国振, 耿魁, 董秀则, 王璇… - Journal on …, 2016 - infocomm-journal.com
针对安全领域中海量业务安全需求多样性导致的多种密码算法运算随机交叉的现象,
提出了具有关联判断控制的基于业务标识的分层硬件调度方法(HHS-ACDID) …

Parallel implementations of somewhat homomorphic encryption based on Open-MP and CUDA

M Moayedfard, AS Molahosseini - 2015 International Congress …, 2015 - ieeexplore.ieee.org
By using Homomorphic Encryption scheme, the Cloud can compute on encrypted data
without any need of decryption and compromising privacy. However, this cryptography …

Low-size cipher text homomorphic encryption scheme for cloud data

MM Potey, CA Dhote, DH Sharma - Networking Communication and Data …, 2018 - Springer
Data security is a major concern in cloud computing. It must satisfy three goals of security in
computing—integrity, confidentiality, and availability. User or cloud service provider (CSP) …

[PDF][PDF] Parallel Computing Mode in Homomorphic Encryption Using GPUs Acceleration in Cloud.

J Xia, Z Ma, X Dai - J. Comput., 2019 - jcomputers.us
As an important encryption algorithm of performing computations directly on ciphertext
without any need of decryption and compromising privacy, homomorphic encryption is an …

Design of Multi Cipher Processing Architecture for Random Cross Access

L Li, F Li, K Geng, G Shi - Microprocessors and Microsystems, 2018 - Elsevier
Aiming at the requirement of random cross business generated by mass data cryptosystems
in security field, in this paper, a pipeline data processing architecture which includes four …

Research on Privacy Protection Based on Trusted Third Party

H Zhu, C Wei, G Xu, L Luan - 8th International Conference on …, 2018 - atlantis-press.com
With the development of big data, the data privacy of users becomes very important. In this
paper, the privacy protection framework of the reliminary study, the establishment of the …

Securing Cloud-Based File Storage System via Homomorphism

A Tahir, M Khan - … Conference on Recent Advances in Computer …, 2015 - atlantis-press.com
Cloud computing is playing a much important role in comparison to other fields of IT, in
providing Data storage, Data security, Quality of Services (QoS) etc. Many data security …