On the Security of Fully Homomorphic Encryption and Encrypted Computing: Is Division safe?
Peter T. BreuerJonathan P. BowenPublished in: CoRR (2014)
Keyphrases
- homomorphic encryption
- encryption scheme
- privacy preserving
- encrypted data
- data sharing
- security analysis
- third party
- encryption algorithm
- secret key
- intrusion detection
- information security
- database
- access control
- sql queries
- ciphertext
- statistical databases
- public key
- security requirements
- private information
- anomaly detection
- object oriented
- metadata