{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:55:59Z","timestamp":1725951359343},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319766867"},{"type":"electronic","value":"9783319766874"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76687-4_9","type":"book-chapter","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T04:02:09Z","timestamp":1519358529000},"page":"127-139","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/5695-6974-1265-8412","authenticated-orcid":false,"given":"Khalil","family":"Hariss","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Noura","sequence":"additional","affiliation":[]},{"given":"Abed Ellatif","family":"Samhat","sequence":"additional","affiliation":[]},{"given":"Maroun","family":"Chamoun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"issue":"2","key":"9_CR1","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/MSP.2012.2230219","volume":"30","author":"C Aguilar-Melchor","year":"2013","unstructured":"Aguilar-Melchor, C., Fau, S., Fontaine, C., Gogniat, G., Sirdey, R.: Recent advances in homomorphic encryption: a possible future. IEEE Signal Process. Mag. 30(2), 108\u2013117 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Chan, AC-F.: Symmetric-key homomorphic encryption for encrypted data processing. In: 2009 IEEE International Conference on Communications, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199505"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Fau, S., Sirdey, R., Fontaine, C., Aguilar-Melchor, C., Gogniat, G.: Towards practical program execution over fully homomorphic encryption schemes. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 284\u2013290. IEEE (2013)","DOI":"10.1109\/3PGCIC.2013.48"},{"issue":"1","key":"9_CR4","first-page":"1","volume":"2007","author":"C Fontaine","year":"2007","unstructured":"Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007(1), 1\u201310 (2007)","journal-title":"EURASIP J. Inf. Secur."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"2","key":"9_CR6","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Nassar, M., Erradi, A., Malluhi, Q.M.: Paillier\u2019s encryption: implementation and cloud applications. In: 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beirut, pp. 1\u20135 (2015)","DOI":"10.1109\/ARCSE.2015.7338149"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","volume-title":"Advances in Cryptology\u2013EUROCRYPT 2010","author":"M Dijk van","year":"2010","unstructured":"van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24\u201343. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_2"},{"key":"9_CR9","unstructured":"Xiao, L., et al.: An Efficient Homomorphic Encryption Protocol for Multi-User Systems. IACR Cryptology ePrint Archive, Report 2012\/193"},{"key":"9_CR10","unstructured":"Kipnis, A., Hibshoosh, E.: Efficient methods for practical fully-homomorphic symmetric-key encryption, randomization, and verification. IACR Cryptology ePrint Archive, Report 2012\/637"},{"issue":"5","key":"9_CR11","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/S0020-0190(96)00170-6","volume":"60","author":"JD Ferrer","year":"1996","unstructured":"Ferrer, J.D.: A new privacy homomorphism and applications. Inf. Process. Lett. 60(5), 277\u2013282 (1996)","journal-title":"Inf. Process. Lett."},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-45811-5_37","volume-title":"Information Security","author":"JD Ferrer","year":"2002","unstructured":"Ferrer, J.D.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471\u2013483. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45811-5_37"},{"key":"9_CR13","first-page":"928","volume":"2015","author":"H Noura","year":"2015","unstructured":"Noura, H., Courrous\u00e9, D.: HLDCA-WSN:homomorphic lightweight data confidentiality algorithm for wireless sensor network. Int. Assoc. Cryptogr. Res. IACR 2015, 928 (2015)","journal-title":"Int. Assoc. Cryptogr. Res. IACR"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, P., Jiang, Y., Lin, C., Fan, Y., Shen, X.: P-coding: secure network coding against eavesdropping attacks. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"9_CR15","unstructured":"Noura, H., Samhat, A.E., Harkous, Y., Yahiya, T.A.: Design and realization of a neural block cipher. In: 2015 International conference on Applied Research in Computer Science and Engineering (IACR), Beirut, pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/ARCSE 2015.7338131"},{"issue":"2","key":"9_CR16","first-page":"288","volume":"52","author":"D Vizer","year":"2015","unstructured":"Vizer, D., Vaudenay, S.: Cryptanalysis of chosen symmetric homomorphic scheme. Stud. Sci. Math. Hung. 52(2), 288\u2013306 (2015)","journal-title":"Stud. Sci. Math. Hung."}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76687-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T13:36:56Z","timestamp":1570801016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76687-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319766867","9783319766874"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76687-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}