Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes.
Zhenfei ZhangThomas PlantardWilly SusiloPublished in: ICISC (2011)
Keyphrases
- encryption scheme
- chosen ciphertext
- secret key
- ciphertext
- standard model
- encryption algorithm
- security analysis
- chosen plaintext attack
- data sharing
- public key
- secret sharing scheme
- cca secure
- third party
- encrypted data
- diffie hellman
- proxy re encryption
- security model
- provably secure
- public key encryption
- authentication protocol
- database
- lossless compression
- hash functions
- smart card
- low cost
- multiresolution