RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCIE SCOPUS

      A Survey of Homomorphic Encryption for Outsourced Big Data Computation = A Survey of Homomorphic Encryption for Outsourced Big Data Computation

      한글로보기

      https://www.riss.kr/link?id=A103334182

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced...

      With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced initiative introduces a number of security and privacy concerns. In this paper, homomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data. This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.

      더보기

      참고문헌 (Reference)

      1 A. Costache, "Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?" 9610 : 325-340, 2016

      2 K. Eisentrager., "Weak Instance of PLWE" 8781 : 183-194, 2014

      3 Y. Doröz., "Toward Practical Homomorphic Evaluation of Block Ciphers using Prince" 8438 : 208-220, 2014

      4 J. Fan., "Somewhat Practical Fully Homomorphic Encryption" IACR Cryptol. ePrint Arch 2015

      5 P. S. Pisa., "Somewhat Homomorphic Encryption Scheme for Arithmetic Operation" 2012

      6 M. Yasuda., "Secure Statistical Analysis Using R-LWE Based Homomorphic Encryption" 9144 : 471-487, 2015

      7 R. Hall., "Secure Multiple Linear Regression Based on Homomorphic Encryption" 27 (27): 669-691, 2011

      8 J. Coron., "Scale-Invariant Fully Homomorphic Encryption over the Integers" 8383 : 311-328, 2014

      9 Y. Elias., "Provably Weak Instances of Ring-LWE" 9215 : 63-92, 2015

      10 J. Bos., "Private Predictive Analysis on Encrypted Medical Data" 50 : 234-343, 2014

      1 A. Costache, "Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?" 9610 : 325-340, 2016

      2 K. Eisentrager., "Weak Instance of PLWE" 8781 : 183-194, 2014

      3 Y. Doröz., "Toward Practical Homomorphic Evaluation of Block Ciphers using Prince" 8438 : 208-220, 2014

      4 J. Fan., "Somewhat Practical Fully Homomorphic Encryption" IACR Cryptol. ePrint Arch 2015

      5 P. S. Pisa., "Somewhat Homomorphic Encryption Scheme for Arithmetic Operation" 2012

      6 M. Yasuda., "Secure Statistical Analysis Using R-LWE Based Homomorphic Encryption" 9144 : 471-487, 2015

      7 R. Hall., "Secure Multiple Linear Regression Based on Homomorphic Encryption" 27 (27): 669-691, 2011

      8 J. Coron., "Scale-Invariant Fully Homomorphic Encryption over the Integers" 8383 : 311-328, 2014

      9 Y. Elias., "Provably Weak Instances of Ring-LWE" 9215 : 63-92, 2015

      10 J. Bos., "Private Predictive Analysis on Encrypted Medical Data" 50 : 234-343, 2014

      11 201M. Kim., "Private Genome Analysis Through Homomorphic Encryption" 1-15, 2015

      12 D. Boneh., "Private Database Queries Using Somewhat Homomorphic Encryption" 7954 : 102-118, 2013

      13 K. Lauter., "Private Computation on Encrypted Genomic Data" 8895 : 3-27, 2015

      14 D. Liu, "Practical fully homomorphic encryption without noise reduction" IACR Cryptol. ePrint Arch 2015

      15 M. Yasuda., "Practical Packing Method in Somewhat Homomorphic Encryption" 8247 : 34-50, 2014

      16 Z. Brakerski., "Packed Ciphertexts in LWE-based Homomorphic Encryption" 7778 : 1-13, 2013

      17 V. Lyubashevsky., "On Ideal Lattices and Learning with Errors over Rings" 6110 : 1-23, 2010

      18 Y. Wang, "Octonion Algebra and Noise-Free Fully Homomorphic Encryption(FHE)Schemes"

      19 J. Li., "Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings" IACR Cryptol. ePrint Arch. 2015

      20 M. Yasuda., "New Packing Method in Somewhat Homomorphic Encryption and Its Applications" 8 (8): 2194-2213, 2015

      21 N. Dowlin., "Manual for Using Homomorphic Encryption for BioInformatics" Microsoft 1-16, 2015

      22 D. Stehle., "Making NTRU as Secure as Worst-case Problems over Ideal Lattices" 6632 : 27-47, 2011

      23 M. Chenal., "Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes" 9290 : 397-418, 2015

      24 C. Gentry., "Implementing Gentry’s Fully-Homomorphic Encryption Scheme" 6632 : 129-148, 2011

      25 C. Gentry., "Homomorphic Encryption from Learning with Errors : Conceptually-simpler, Asymptotically-faster, Attribute-based" 8042 : 72-92, 2013

      26 Y. Doroz., "Homomorphic AES Evaluation using NTRU"

      27 M. Yagisawa, "Fully homomorphic encryption without bootstrapping" IACR Cryptol. ePrint Arch 2015

      28 M. Yagisawa, "Fully homomorphic encryption on octonion ring" IACR Cryptol. ePrint Arch 2015

      29 N. P. Smart., "Fully Homomorphic SIMD Operations" 71 (71): 57-81, 2014

      30 M. Yagisawa, "Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem" IACR Cryptol. ePrint Arch. 2016

      31 M. Dijk., "Fully Homomorphic Encryption over the Integers" 6110 : 24-43, 2010

      32 Y. Ramaiah., "Efficient Public Key Homomorphic Encryption Over Integer Plaintexts" 123-128, 2012

      33 H. Zhou., "Efficient Homomorphic Encryption on Integer Vectors and Its Applications" 1-9, 2014

      34 N. Downlin., "CryptoNets : Applying Neural Networks to Encrypted Data with High Throughput and Accuracy" 2016

      35 K. Nuida, "Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise" IACR Cryptol. ePrint Arch 2015

      36 H. Chen., "Attacks on Search-RLWE" IACR Cryptol. ePrint Arch 2015

      37 H. T. Lee., "Analysis of Gong et al. ’ s CCA2-Secure Homomorphic Encryption" IACR Cryptol. ePrint Arch 2016

      38 D. B. Cousins., "An FPGA Co-Processor Implementation of Homomorphic Encryption" 9-11, 2014

      39 Y. Hu., "An Attack on a Fully Homomorphic Encryption Scheme" IACR Cryptol. ePrint Arch 2012

      40 R. Dahab., "Adaptive Key Recovery Attacks on NTRU-based Somewhat Homomorphic Encryption Schemes" 9063 : 283-296, 2015

      41 Y. Doroz., "Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware" 9293 : 185-204, 2015

      42 T. Poppelmann., "Accelerating Homomorphic Evaluation on Reconfigurable Hardware" IACR Cryptol. ePrint Arch 2015

      43 X. Cao., "Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction" Cryptology ePrint Archive 2013

      44 Y. Doroz., "Accelerating Fully Homomorphic Encryption in Hardware" 64 (64): 1509-1521, 2016

      45 K. Rohloff., "A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU" 8438 : 221-234, 2014

      46 Z. Chen., "A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching" 2014 : 2014

      47 Y. Ding., "A Novel Fully Homomorphic Encryption Based on LWE" 21 (21): 84-92, 2016

      48 Z.Chen, "A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE" IACR Cryptol. ePrint Arch. 2015

      49 E. Morais., "A Key Recovery Attack to the Scale-Invariant NTRU-based Somewhat Homomorphic Encryption Scheme" IACR Cryptol. ePrint Arch 2014

      50 L. Gong., "A Homomorphic Encryption Scheme with Adaptive Chosen Ciphertext Security But Without Random Oracle" 609 : 253-261, 2016

      51 T. Lepoint., "A Comparison of the Homomorphic Encryption Schemes FV and YASHE" 8469 : 318-335, 2014

      52 K. Nuida., "(Batch)Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces" 9056 : 537-555, 2015

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      학술지등록 한글명 : KSII Transactions on Internet and Information Systems
      외국어명 : KSII Transactions on Internet and Information Systems
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2013-10-01 평가 등재학술지 선정 (기타) KCI등재
      2011-01-01 평가 등재후보학술지 유지 (기타) KCI등재후보
      2009-01-01 평가 SCOPUS 등재 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.45 0.21 0.37
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.32 0.29 0.244 0.03
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼