Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks.
Levent ErtaulVaidehi KedlayaPublished in: Security and Management (2006)
Keyphrases
- computer networks
- encryption scheme
- optimal path
- standard model
- path planning
- security analysis
- shortest path
- network security
- intrusion detection system
- public key
- communication networks
- computer systems
- network traffic
- data sharing
- secret key
- lossless compression
- computer network security
- public key encryption
- security model
- hash functions
- privacy preserving
- ciphertext
- homomorphic encryption
- cca secure
- information systems
- databases