Discrete logarithm based additively homomorphic encryption and secure data aggregation
From MaRDI portal
Publication:433021
DOI10.1016/j.ins.2011.04.002zbMath1242.68105OpenAlexW2158001192MaRDI QIDQ433021
Zonghua Zhang, Yun Pan, Li-hua Wang, Yi-Xian Yang, Li-Cheng Wang
Publication date: 13 July 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2011.04.002
Related Items (3)
A visibility graph averaging aggregation operator ⋮ Homomorphic encryption systems statement: trends and challenges ⋮ Linearly Homomorphic Encryption from $$\mathsf {DDH}$$
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Homomorphic encryption and secure comparison
- Threshold cryptography based on Asmuth-Bloom secret sharing
- Towards a DL-Based Additively Homomorphic Encryption Scheme
- Fully Homomorphic Encryption over the Integers
- Additively Homomorphic Encryption with d-Operand Multiplications
- Verifiable Rotation of Homomorphic Encryptions
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- A monte carlo method for factorization
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Fully homomorphic encryption using ideal lattices
- Private Searching on Streaming Data
- Public Key Cryptography - PKC 2006
This page was built for publication: Discrete logarithm based additively homomorphic encryption and secure data aggregation