Enhanced fully homomorphic encryption scheme using modified key generation for cloud environment
Fully homomorphic encryption (FHE) is a special class of encryption that allows performing unlimited mathematical operations on encrypted data without decrypting it. There are symmetric and asymmetric FHE schemes. The symmetric schemes suffer from the semantically security property and need more per...
| Auteur principal: | Nagmeldin, Wamda Abdelrahman Elhag |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2020
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/98420/1/WamdaAbdelRahmanElhagPSC2020.pdf |
Documents similaires
Data Integrity For Cloud Computing With Homomorphic Encryption
par: Awadallah, Ruba N S
Publié: (2022)
par: Awadallah, Ruba N S
Publié: (2022)
Cloud based privacy preserving data mining model using hybrid k-anonymity and partial homomorphic encryption
par: Mansour Osman, Huda Osman
Publié: (2022)
par: Mansour Osman, Huda Osman
Publié: (2022)
Comparative study on encryption algorithms in cloud environment
par: Suhaimi, Asiah Mastura
Publié: (2017)
par: Suhaimi, Asiah Mastura
Publié: (2017)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
par: Khalid, Roszelinda
Publié: (2018)
par: Khalid, Roszelinda
Publié: (2018)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
par: Omolara, Abiodun Esther
Publié: (2020)
par: Omolara, Abiodun Esther
Publié: (2020)
Secret sharing scheme for key management of secure data sharing in cloud
par: Abd Majid, Noorhafezan
Publié: (2019)
par: Abd Majid, Noorhafezan
Publié: (2019)
Enhanced image encryption scheme with new mapreduce approach for big size images
par: Al-Khasawneh, Mahmoud Ahmad Salem
Publié: (2018)
par: Al-Khasawneh, Mahmoud Ahmad Salem
Publié: (2018)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
par: Abuadhmah, Najlaa Abdullah
Publié: (2010)
par: Abuadhmah, Najlaa Abdullah
Publié: (2010)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
par: Ismaeel, Nooruldeen Qutaiba
Publié: (2016)
par: Ismaeel, Nooruldeen Qutaiba
Publié: (2016)
Enhanced forensic process model in cloud environment
par: Moussa, Ahmed Nour
Publié: (2018)
par: Moussa, Ahmed Nour
Publié: (2018)
A multi-factor authentication scheme using attack recognition and key generator technique
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
Enhance key generation algorithm based user string identity as public key
par: Norhidayah, Muhammad
Publié: (2015)
par: Norhidayah, Muhammad
Publié: (2015)
Enhanced non-parametric sequence learning scheme for internet of things sensory data in cloud infrastructure
par: Abel, Edje Efetobor
Publié: (2022)
par: Abel, Edje Efetobor
Publié: (2022)
An index based searchable encryption scheme with IND-CCA security
par: Nateghizad, Majid
Publié: (2014)
par: Nateghizad, Majid
Publié: (2014)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
par: Jamal, Fara
Publié: (2021)
par: Jamal, Fara
Publié: (2021)
An adaptive and distributed intrusion detection scheme for cloud computing
par: Ibrahim, Nurudeen Mahmud
Publié: (2019)
par: Ibrahim, Nurudeen Mahmud
Publié: (2019)
An improved image steganography scheme based on distinction grade value and secret message encryption
par: Taha, Mustafa Sabah
Publié: (2020)
par: Taha, Mustafa Sabah
Publié: (2020)
Flat role based access control and encryption scheme for database security
par: Al Farissi, Al Farissi
Publié: (2013)
par: Al Farissi, Al Farissi
Publié: (2013)
Energy-efficient resource allocation scheme based on enhanced flower pollination algorithm for cloud computing data center
par: Mohammed Joda, Usman
Publié: (2018)
par: Mohammed Joda, Usman
Publié: (2018)
Multi-shape symmetric encryption mechanism for nongeneric attacks mitigation
par: Abdelgader, Abdelrahman Abdelgader Altigani
Publié: (2022)
par: Abdelgader, Abdelrahman Abdelgader Altigani
Publié: (2022)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
par: Mohd Satar, Siti Dhalila
Publié: (2023)
par: Mohd Satar, Siti Dhalila
Publié: (2023)
An efficient crime group of secured data sharing scheme in cloud
par: Rashid, Mustafa Noori
Publié: (2018)
par: Rashid, Mustafa Noori
Publié: (2018)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)
par: H. Belgassem, Seddeq
Publié: (2004)
Workflow system for MapReduce in cloud environment
par: Wadi, Muntadher Saadoon
Publié: (2017)
par: Wadi, Muntadher Saadoon
Publié: (2017)
An enhanced color image encryption algorithm using LT-PRNG
par: Mohammed Ismael, Saba
Publié: (2018)
par: Mohammed Ismael, Saba
Publié: (2018)
Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol
par: Qamar, Riaz Ahmad
Publié: (2013)
par: Qamar, Riaz Ahmad
Publié: (2013)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
par: Syed Adnan, Syed Farid
Publié: (2019)
par: Syed Adnan, Syed Farid
Publié: (2019)
Enhanced analysis of kippo-honeypot in cloud
par: Alzubaidi, Mohammed Abdullah Omar
Publié: (2015)
par: Alzubaidi, Mohammed Abdullah Omar
Publié: (2015)
Enhanced cuckoo malware analysis performance using cloud computing
par: Barakat, Osamah Lutf Hamood
Publié: (2013)
par: Barakat, Osamah Lutf Hamood
Publié: (2013)
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
par: Mohd Ali, Fazlina
Publié: (2022)
par: Mohd Ali, Fazlina
Publié: (2022)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
par: Shereek, Balkees Mohamed
Publié: (2016)
par: Shereek, Balkees Mohamed
Publié: (2016)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
par: Omolara, Abiodun Esther
Publié: (2020)
par: Omolara, Abiodun Esther
Publié: (2020)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
par: Younes, Mohammad Ali Moh'd Bani
Publié: (2009)
par: Younes, Mohammad Ali Moh'd Bani
Publié: (2009)
Efficiency key generation management in a big organization for symmetric cryptography system
par: Mirzaee, Atefeh
Publié: (2013)
par: Mirzaee, Atefeh
Publié: (2013)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
par: Alfin Syafalni, Alfin Syafalni
Publié: (2016)
par: Alfin Syafalni, Alfin Syafalni
Publié: (2016)
Trusted reasoning-role-based access control for cloud computing environment
par: Abdul Rauf, Abdul Rauf
Publié: (2019)
par: Abdul Rauf, Abdul Rauf
Publié: (2019)
Modified workflow scheduling using hybrid PSO-GA algorithm in cloud computing
par: Oke, Omotayo Patrick
Publié: (2019)
par: Oke, Omotayo Patrick
Publié: (2019)
Resource allocation for job optimization in multi-cloud environment
par: Mohamaddiah, Mohd Hairy
Publié: (2023)
par: Mohamaddiah, Mohd Hairy
Publié: (2023)
Analyses of key management techniques for secure patient monitoring in wireless sensor network environment
par: Majidi, Mojib
Publié: (2010)
par: Majidi, Mojib
Publié: (2010)
Dynamic load balancing algorithm based on deadline constrained in cloud environment
par: Mansur, Muzzammil
Publié: (2019)
par: Mansur, Muzzammil
Publié: (2019)
Documents similaires
-
Data Integrity For Cloud Computing With Homomorphic Encryption
par: Awadallah, Ruba N S
Publié: (2022) -
Cloud based privacy preserving data mining model using hybrid k-anonymity and partial homomorphic encryption
par: Mansour Osman, Huda Osman
Publié: (2022) -
Comparative study on encryption algorithms in cloud environment
par: Suhaimi, Asiah Mastura
Publié: (2017) -
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
par: Khalid, Roszelinda
Publié: (2018) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
par: Omolara, Abiodun Esther
Publié: (2020)