A Threshold Cryptosystem in Secure Cloud Computations
https://doi.org/10.15514/ISPRAS-2014-26(2)-12
Abstract
About the Authors
N. P. VarnovskijRussian Federation
S. A. Martishin
Russian Federation
M. V. Khrapchenko
Russian Federation
A. V. Shokurov
Russian Federation
References
1. C. Gentry, Fully homomorphic encryption using ideal lattices , in Proceedings of the 41st ACM Symposium on Theory of Computing|STOC 2009, ACM, New York (2009), 169-178.
2. C. Gentry and S. Halevi, Implementing Gentry's Fully-Homomorphic Encryption Scheme , in Advances in Cryptology|EUROCRYPT 2011, Lect. Notes in Comp. Sci. 6632 , (2011), Springer, 129-148.
3. M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, Fully Homomorphic Encryption over the Integers , in Advances in Cryptology|EUROCRYPT 2010, Lect. Notes in Comp. Sci. 6110 (2010), Springer, 24-43.
4. M. v. Dijk and A. Juels. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Hot topics in Security (HotSec'10), pages 1-8. USENIX Association, 2010.
Review
For citations:
Varnovskij N.P., Martishin S.A., Khrapchenko M.V., Shokurov A.V. A Threshold Cryptosystem in Secure Cloud Computations. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2014;26(2):269-274. (In Russ.) https://doi.org/10.15514/ISPRAS-2014-26(2)-12