Essays about: "fully homomorphic encryption"

Found 3 essays containing the words fully homomorphic encryption.

  1. 1. Efficient Homomorphic Encryption using FPGA-Acceleration

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : JOHN ÅKERMAN; OSKAR SVALBACKE; ANNA-MARIA UNTERBERGER; KARL-JOHAN VON HACHT; [2020-10-30]
    Keywords : fully homomorphic encryption; fpga acceleration; software hardware codesign;

    Abstract : The data being handled by many applications is in most cases confidential. Furthermore,the applications handling such data are nowadays often offloaded to remotedata centers in the cloud. Computation on data in this environment is not securesince data is only encrypted when stored, and not while it is operated on. READ MORE

  2. 2. Homomorphic Encryption on the IoT

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Han Wang; [2018]
    Keywords : Security; IoT; Fully homomorphic encryption;

    Abstract : Security is always a big problem in IoT (internet of things),when it comes to IoT, there must have cloud computing because many devices in IoT are small embedded devices and they don’t always have enough power to finish some complex calculations. Then, they need to take advantage of a third party system especially cloud at present to finish some operations, but the cloud is not safe enough now, in which some important and private information may be leaked, then people introduce homomorphic encryption which can do calculation on encrypted data. READ MORE

  3. 3. Homomorphic Encryption: Working and Analytical Assessment : DGHV, HElib, Paillier, FHEW and HE in cloud security

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Srinivas Divya Papisetty; [2017]
    Keywords : Homomorphic encryption; Homomorphic Encryption Schemes; Cloud security; Cryptography;

    Abstract : Context: Secrecy has kept researchers spanning over centuries engaged in the creation of data protection techniques. With the growing rate of data breach and intervention of adversaries in confidential data storage and communication, efficient data protection has found to be a challenge. READ MORE