Enhanced fully homomorphic encryption scheme using modified key generation for cloud environment
Fully homomorphic encryption (FHE) is a special class of encryption that allows performing unlimited mathematical operations on encrypted data without decrypting it. There are symmetric and asymmetric FHE schemes. The symmetric schemes suffer from the semantically security property and need more per...
| Main Author: | Nagmeldin, Wamda Abdelrahman Elhag |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/98420/1/WamdaAbdelRahmanElhagPSC2020.pdf |
Similar Items
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Cloud based privacy preserving data mining model using hybrid k-anonymity and partial homomorphic encryption
by: Mansour Osman, Huda Osman
Published: (2022)
by: Mansour Osman, Huda Osman
Published: (2022)
Comparative study on encryption algorithms in cloud environment
by: Suhaimi, Asiah Mastura
Published: (2017)
by: Suhaimi, Asiah Mastura
Published: (2017)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Enhanced image encryption scheme with new mapreduce approach for big size images
by: Al-Khasawneh, Mahmoud Ahmad Salem
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad Salem
Published: (2018)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Enhanced forensic process model in cloud environment
by: Moussa, Ahmed Nour
Published: (2018)
by: Moussa, Ahmed Nour
Published: (2018)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Enhanced non-parametric sequence learning scheme for internet of things sensory data in cloud infrastructure
by: Abel, Edje Efetobor
Published: (2022)
by: Abel, Edje Efetobor
Published: (2022)
An index based searchable encryption scheme with IND-CCA security
by: Nateghizad, Majid
Published: (2014)
by: Nateghizad, Majid
Published: (2014)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
An adaptive and distributed intrusion detection scheme for cloud computing
by: Ibrahim, Nurudeen Mahmud
Published: (2019)
by: Ibrahim, Nurudeen Mahmud
Published: (2019)
An improved image steganography scheme based on distinction grade value and secret message encryption
by: Taha, Mustafa Sabah
Published: (2020)
by: Taha, Mustafa Sabah
Published: (2020)
Flat role based access control and encryption scheme for database security
by: Al Farissi, Al Farissi
Published: (2013)
by: Al Farissi, Al Farissi
Published: (2013)
Energy-efficient resource allocation scheme based on enhanced flower pollination algorithm for cloud computing data center
by: Mohammed Joda, Usman
Published: (2018)
by: Mohammed Joda, Usman
Published: (2018)
Multi-shape symmetric encryption mechanism for nongeneric attacks mitigation
by: Abdelgader, Abdelrahman Abdelgader Altigani
Published: (2022)
by: Abdelgader, Abdelrahman Abdelgader Altigani
Published: (2022)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Workflow system for MapReduce in cloud environment
by: Wadi, Muntadher Saadoon
Published: (2017)
by: Wadi, Muntadher Saadoon
Published: (2017)
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018)
by: Mohammed Ismael, Saba
Published: (2018)
Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol
by: Qamar, Riaz Ahmad
Published: (2013)
by: Qamar, Riaz Ahmad
Published: (2013)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
Enhanced analysis of kippo-honeypot in cloud
by: Alzubaidi, Mohammed Abdullah Omar
Published: (2015)
by: Alzubaidi, Mohammed Abdullah Omar
Published: (2015)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
by: Mohd Ali, Fazlina
Published: (2022)
by: Mohd Ali, Fazlina
Published: (2022)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
by: Shereek, Balkees Mohamed
Published: (2016)
by: Shereek, Balkees Mohamed
Published: (2016)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Efficiency key generation management in a big organization for symmetric cryptography system
by: Mirzaee, Atefeh
Published: (2013)
by: Mirzaee, Atefeh
Published: (2013)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Trusted reasoning-role-based access control for cloud computing environment
by: Abdul Rauf, Abdul Rauf
Published: (2019)
by: Abdul Rauf, Abdul Rauf
Published: (2019)
Modified workflow scheduling using hybrid PSO-GA algorithm in cloud computing
by: Oke, Omotayo Patrick
Published: (2019)
by: Oke, Omotayo Patrick
Published: (2019)
Resource allocation for job optimization in multi-cloud environment
by: Mohamaddiah, Mohd Hairy
Published: (2023)
by: Mohamaddiah, Mohd Hairy
Published: (2023)
Analyses of key management techniques for secure patient monitoring in wireless sensor network environment
by: Majidi, Mojib
Published: (2010)
by: Majidi, Mojib
Published: (2010)
Dynamic load balancing algorithm based on deadline constrained in cloud environment
by: Mansur, Muzzammil
Published: (2019)
by: Mansur, Muzzammil
Published: (2019)
Similar Items
-
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022) -
Cloud based privacy preserving data mining model using hybrid k-anonymity and partial homomorphic encryption
by: Mansour Osman, Huda Osman
Published: (2022) -
Comparative study on encryption algorithms in cloud environment
by: Suhaimi, Asiah Mastura
Published: (2017) -
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)