𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Homomorphic Encryption and Applications

✍ Scribed by Xun Yi, Russell Paulet, Elisa Bertino (auth.)


Publisher
Springer International Publishing
Year
2014
Tongue
English
Leaves
136
Series
SpringerBriefs in Computer Science
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

✦ Table of Contents


Front Matter....Pages i-xii
Introduction....Pages 1-25
Homomorphic Encryption....Pages 27-46
Fully Homomorphic Encryption....Pages 47-66
Remote End-to-End Voting Scheme....Pages 67-79
Nearest Neighbor Queries with Location Privacy....Pages 81-99
Private Searching on Streaming Data....Pages 101-126

✦ Subjects


Data Encryption; Complex Networks; Mathematical Applications in Computer Science; Data Mining and Knowledge Discovery; Security Science and Technology


πŸ“œ SIMILAR VOLUMES


Fully Homomorphic Encryption in Real Wor
✍ Ayantika Chatterjee, Khin Mi Mi Aung πŸ“‚ Library πŸ“… 2019 πŸ› Springer Singapore 🌐 English

<p>This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the β€˜cloud’. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a d

Partially Homomorphic Encryption
✍ Γ‡etin Kaya KoΓ§; Funda Γ–zdemir; Zeynep Γ–demiş Γ–zger πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Ben

Advances to Homomorphic and Searchable E
✍ Stefania Loredana Nita, Marius Iulian Mihailescu πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view. Homomorphic and searchable encryption are still relatively novel and rapidly evolving areas and face practical constraints in th

Protecting Privacy through Homomorphic E
✍ Kristin Lauter, Wei Dai, Kim Laine πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<div><div>This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 yea

Protecting Privacy through Homomorphic E
✍ Kristin Lauter (editor), Wei Dai (editor), Kim Laine (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<div><div>This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 yea

Protecting Privacy through Homomorphic E
✍ Kristin Lauter (editor), Wei Dai (editor), Kim Laine (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years,