Derandomization Security of Homomorphic Encryption
The paper considers the problems of developing and analysis of cloud database systems. We determine the requrments for encryption to be usable in practical applications. A new notion - a non-derandomizable encryption - allows to do this and we explain the practical value of this notion as well as li...
| Published in: | Труды Института системного программирования РАН |
|---|---|
| Main Author: | A. . Trepacheva |
| Format: | Article |
| Language: | English |
| Published: |
Russian Academy of Sciences, Ivannikov Institute for System Programming
2018-10-01
|
| Subjects: | |
| Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/933 |
Similar Items
Batch Symmetric Fully Homomorphic Encryption Using Matrix Polynomials
by: Ph. Burtyka
Published: (2018-10-01)
by: Ph. Burtyka
Published: (2018-10-01)
A Threshold Cryptosystem in Secure Cloud Computations
by: N. P. Varnovskij, et al.
Published: (2018-10-01)
by: N. P. Varnovskij, et al.
Published: (2018-10-01)
О нестойкости двух симметричных гомоморфных криптосистем, основанных на системе остаточных классов
by: Ludmila Kliment'evna Babenko, et al.
Published: (2019-02-01)
by: Ludmila Kliment'evna Babenko, et al.
Published: (2019-02-01)
Improved known plaintexts attack on Domingo-Ferrer homomorphic cryptosystem
by: A. V. Trepacheva
Published: (2018-10-01)
by: A. V. Trepacheva
Published: (2018-10-01)
On Constructing a Fully Homomorphic Encryption
by: A. V. Shokurov, et al.
Published: (2018-10-01)
by: A. V. Shokurov, et al.
Published: (2018-10-01)
AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS
by: U. A. Vishniakou, et al.
Published: (2019-06-01)
by: U. A. Vishniakou, et al.
Published: (2019-06-01)
THE NEW SCHEME OF INFORMATION STORAGE IN CLOUD ENVIRONMENTS BASED ON A SYSTEM OF RESIDUAL CLASSES, SCHEMES SECRET SHARING
by: Nikolay Ivanovich Chervyakov, et al.
Published: (2022-10-01)
by: Nikolay Ivanovich Chervyakov, et al.
Published: (2022-10-01)
DISPERSION ELECTROMAGNETIC RADIATION SHIELDS FOR THE INFORMATION PROTECTION SYSTEMS
by: M. A. Vilkotski, et al.
Published: (2019-06-01)
by: M. A. Vilkotski, et al.
Published: (2019-06-01)
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
by: V. V. Davydov, et al.
Published: (2025-07-01)
by: V. V. Davydov, et al.
Published: (2025-07-01)
About actualization of informational component of school mathematical tasks
by: O V Tiugaeva
Published: (2013-12-01)
by: O V Tiugaeva
Published: (2013-12-01)
Полиномиальные аппроксимации некоторых функций активации нейронных сетей
by: Grigory Marshalko, et al.
Published: (2022-02-01)
by: Grigory Marshalko, et al.
Published: (2022-02-01)
ATA ENCRYPTION USING THE CHAOTIC DYNAMICS IN WIRELESS SENSOR NETWORKS
by: A. V. Sidorenko, et al.
Published: (2019-06-01)
by: A. V. Sidorenko, et al.
Published: (2019-06-01)
The DaTa Encryption Based on Discrete Chaotic SYSTEMS AND MAPS
by: A. V. Sidorenko, et al.
Published: (2019-06-01)
by: A. V. Sidorenko, et al.
Published: (2019-06-01)
DEtermination of the energy criterion for evaluating information security against leakage channel side electromagnetic radiation
by: M. V. Zhalkousky
Published: (2019-06-01)
by: M. V. Zhalkousky
Published: (2019-06-01)
EMERGING ARCHITECTURES FOR PROCESSOR-IN-MEMORY CHIPS: TAXONOMY AND IMPLEMENTATION
by: A Lapshinsky Valery
Published: (2016-12-01)
by: A Lapshinsky Valery
Published: (2016-12-01)
The Сontrol of the Chaotic Regimes in Encryption Algorithm Based on Dynamic Chaos
by: A. V. Sidorenko
Published: (2019-06-01)
by: A. V. Sidorenko
Published: (2019-06-01)
AIR BUBBLE PANEL FOR INFORMATION PROTECTION FROM LEAKAGE VIA TECHNICAL CHANNELS
by: O. B. Zelmanski, et al.
Published: (2019-06-01)
by: O. B. Zelmanski, et al.
Published: (2019-06-01)
Математическая модель защищенного канала связи для морских исследований методом стеганографии
by: И. Н. Карцан
Published: (2024-06-01)
by: И. Н. Карцан
Published: (2024-06-01)
The bases of development of systems of control and protection information from internal threats
by: V E Zhuzhzhalov, et al.
Published: (2013-12-01)
by: V E Zhuzhzhalov, et al.
Published: (2013-12-01)
SOFTWARE TOOLS FOR MODELING of physical processes in the protection of the speech information
by: I. V. Savchenko
Published: (2019-06-01)
by: I. V. Savchenko
Published: (2019-06-01)
Обеспечение защиты информации от утечки по акустическому каналу
by: И. Н. Карцан
Published: (2024-03-01)
by: И. Н. Карцан
Published: (2024-03-01)
Stand for researching the dynamics of changing the thermal fields in the information and communication equipment at the evaluation of the data protection
by: A. I. Kukharenko, et al.
Published: (2019-06-01)
by: A. I. Kukharenko, et al.
Published: (2019-06-01)
МЕТОДИКА ОБЕСПЕЧЕНИЯ У ШКОЛЬНИКОВ БЕЗОПАСНОСТИ В СЕТИ ИНТЕРНЕТ
Published: (2022-04-01)
Published: (2022-04-01)
RESEARCHES OF ELECTROMAGNETIC SCREENS
by: S. F. Ali
Published: (2019-06-01)
by: S. F. Ali
Published: (2019-06-01)
SHIELDING AND MASKING PROPERTIES OF THE METAMATERIAL AS SCREENS
by: S. F. Ali
Published: (2019-06-01)
by: S. F. Ali
Published: (2019-06-01)
The Failure of Mandated Disclosure
by: O. Ben-Shahar, et al.
Published: (2017-12-01)
by: O. Ben-Shahar, et al.
Published: (2017-12-01)
THE FAILURE OF MANDATED DISCLOSURE
by: C. E. Schneider
Published: (2017-06-01)
by: C. E. Schneider
Published: (2017-06-01)
THE FAILURE OF MANDATED DISCLOSURE
by: O. Ben-Shahar, et al.
Published: (2017-09-01)
by: O. Ben-Shahar, et al.
Published: (2017-09-01)
Russian «Black Cabinet»
by: D. A. Larin
Published: (2012-06-01)
by: D. A. Larin
Published: (2012-06-01)
Dynamic key generation according to the starting time
by: A. S. Kiryantsev, et al.
Published: (2018-10-01)
by: A. S. Kiryantsev, et al.
Published: (2018-10-01)
Разработка системы физической защиты информации для центра морских исследований
by: С. А. Нуриев, et al.
Published: (2023-08-01)
by: С. А. Нуриев, et al.
Published: (2023-08-01)
Constructing Private Service with CRYP2CHAT application
by: Andrey Kiryantsev, et al.
Published: (2018-10-01)
by: Andrey Kiryantsev, et al.
Published: (2018-10-01)
Enhancing healthcare data security in cloud environments with dual authentication and optimal key-tuned encryption Hema Ambiha Aravindakshan1, Pragaladan Rengasamy2
by: H. А. Aravindakshan, et al.
Published: (2024-12-01)
by: H. А. Aravindakshan, et al.
Published: (2024-12-01)
HPC cloud system design and implementation
by: A. O. Kudryavtsev, et al.
Published: (2018-10-01)
by: A. O. Kudryavtsev, et al.
Published: (2018-10-01)
PROCEDURE FOR ASSESSING THE SECURITY OF AN INTEGRATED PLATFORM FOR THE DEVELOPMENT OF CORPORATE APPLICATIONS
by: V. A. Lomazov, et al.
Published: (2022-08-01)
by: V. A. Lomazov, et al.
Published: (2022-08-01)
JINR Cloud Service: Status and Perspectives
by: N. . Balashov, et al.
Published: (2018-10-01)
by: N. . Balashov, et al.
Published: (2018-10-01)
Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic
by: Marat Akhin, et al.
Published: (2012-01-01)
by: Marat Akhin, et al.
Published: (2012-01-01)
SYNTHESIS OF SPEECH-LIKE SIGNALS IN THE BELARUSIAN LANGUAGE
by: H. V. Davydau, et al.
Published: (2019-06-01)
by: H. V. Davydau, et al.
Published: (2019-06-01)
МОДЕЛЬ КАНАЛА УТЕЧКИ РЕЧЕВОЙ ИНФОРМАЦИИ
Published: (2019-06-01)
Published: (2019-06-01)
Avalanche: adaptation of parallel and distributed computing for dynamic analysis to improve performance of defect detection
by: M. K. Ermakov, et al.
Published: (2018-10-01)
by: M. K. Ermakov, et al.
Published: (2018-10-01)
Similar Items
-
Batch Symmetric Fully Homomorphic Encryption Using Matrix Polynomials
by: Ph. Burtyka
Published: (2018-10-01) -
A Threshold Cryptosystem in Secure Cloud Computations
by: N. P. Varnovskij, et al.
Published: (2018-10-01) -
О нестойкости двух симметричных гомоморфных криптосистем, основанных на системе остаточных классов
by: Ludmila Kliment'evna Babenko, et al.
Published: (2019-02-01) -
Improved known plaintexts attack on Domingo-Ferrer homomorphic cryptosystem
by: A. V. Trepacheva
Published: (2018-10-01) -
On Constructing a Fully Homomorphic Encryption
by: A. V. Shokurov, et al.
Published: (2018-10-01)
