{"title":"同态加密的一个实际用例","authors":"A. Korchi, Nadia El Mrabet","doi":"10.1109/CW.2019.00060","DOIUrl":null,"url":null,"abstract":"This paper is a proof of concept that homomorphic encryption can be deployed in practice and can be used by the industry to ensure security and computation of customer data. In this paper, we present a concrete use case of homomorphic encryption that is not considered in literature, using Fan and Vercauteren (FV) cryptosystem, and we propose a practical implementation of FV cryptosystem and its deployment in an IoT use case.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"237 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Practical Use Case of Homomorphic Encryption\",\"authors\":\"A. Korchi, Nadia El Mrabet\",\"doi\":\"10.1109/CW.2019.00060\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper is a proof of concept that homomorphic encryption can be deployed in practice and can be used by the industry to ensure security and computation of customer data. In this paper, we present a concrete use case of homomorphic encryption that is not considered in literature, using Fan and Vercauteren (FV) cryptosystem, and we propose a practical implementation of FV cryptosystem and its deployment in an IoT use case.\",\"PeriodicalId\":169421,\"journal\":{\"name\":\"International Conference on Cyberworlds\",\"volume\":\"237 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Cyberworlds\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CW.2019.00060\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Cyberworlds","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CW.2019.00060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper is a proof of concept that homomorphic encryption can be deployed in practice and can be used by the industry to ensure security and computation of customer data. In this paper, we present a concrete use case of homomorphic encryption that is not considered in literature, using Fan and Vercauteren (FV) cryptosystem, and we propose a practical implementation of FV cryptosystem and its deployment in an IoT use case.