{"title":"全同态加密在云计算中的应用","authors":"Baohua Chen, Na Zhao","doi":"10.1109/ICCWAMTIP.2014.7073452","DOIUrl":null,"url":null,"abstract":"In order to prevent user's data leaked when they submit their data to the cloud server, we use fully homomorphic encryption. We encrypt the data and submit it to the cloud server. The server processes the data, and then returned to the user. This paper introduces the principle of homomorphic encryption, then analyses some homomorphic encryption scheme and its improved algorithm used in cloud computing.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Fully homomorphic encryption application in cloud computing\",\"authors\":\"Baohua Chen, Na Zhao\",\"doi\":\"10.1109/ICCWAMTIP.2014.7073452\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to prevent user's data leaked when they submit their data to the cloud server, we use fully homomorphic encryption. We encrypt the data and submit it to the cloud server. The server processes the data, and then returned to the user. This paper introduces the principle of homomorphic encryption, then analyses some homomorphic encryption scheme and its improved algorithm used in cloud computing.\",\"PeriodicalId\":211273,\"journal\":{\"name\":\"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCWAMTIP.2014.7073452\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCWAMTIP.2014.7073452","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fully homomorphic encryption application in cloud computing
In order to prevent user's data leaked when they submit their data to the cloud server, we use fully homomorphic encryption. We encrypt the data and submit it to the cloud server. The server processes the data, and then returned to the user. This paper introduces the principle of homomorphic encryption, then analyses some homomorphic encryption scheme and its improved algorithm used in cloud computing.