A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security.
Ahmed El-YahyaouiMohamed Dafir Ech-Chrif El KettaniPublished in: CoRR (2018)
Keyphrases
- encryption scheme
- cloud computing
- security analysis
- standard model
- computing resources
- cloud computing environment
- data sharing
- public key
- service providers
- secret key
- data management
- data center
- data privacy
- security model
- ciphertext
- security issues
- cloud storage
- public key cryptosystem
- lossless compression
- encryption algorithm
- network access
- cloud computing platform
- trusted computing
- data sets
- cloud services
- cost effective
- computing infrastructure