On the Security of Practical and Complete Homomorphic Encrypted Computation.
Peter T. BreuerJonathan P. BowenPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- encryption scheme
- encryption decryption
- real world
- network security
- access control
- information security
- security issues
- intrusion detection
- cryptographic protocols
- security policies
- encryption key
- cyber security
- privacy preserving
- functional requirements
- security analysis
- data security
- standard model
- elliptic curve
- user authentication
- security problems
- security threats
- secret key
- efficient computation