SECURE COMPUTATION ON SENSITIVE DATA USING HOMOMORPHIC ENCRYPTION ON ETHEREUM BLOCKCHAIN

被引:0
|
作者
Serban, Razvan [1 ]
Vochescu, Alexandru [1 ]
Dosaru, Daniel [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp Sci, Bucharest, Romania
关键词
Homomorphic encryption; blockchain; data security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the proliferation of electronic devices, there is an ongoing creation of new data for each and every human. There is an ongoing debate about data because of the trade off that happens: security of the data versus the convenience of accessing the data. The exclusivity between the two can simply be narrowed by using a homomorphic encryption algorithm over one of the many blockchains available. This allows for the data to be available to the owner at any time, while also permitting for third parties to operate on the data while not leaking anything about the data involved in the computations.
引用
收藏
页码:273 / 284
页数:12
相关论文
共 50 条
  • [41] A Protected Cloud Computation Algorithm Using Homomorphic Encryption for Preserving Data Integrity
    Awasthi, Prakhar
    Mittal, Sanya
    Mukherjee, Sibeli
    Limbasiya, Trupil
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 509 - 517
  • [42] Securing IoT Healthcare Data: The Power of Blockchain and Homomorphic Encryption
    Sathishkumar, M.
    Raghavendran, V
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024, 2024, : 309 - 314
  • [43] Distributed Proxy Re-Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption
    Demir, Busranur Bulbul
    Altilar, Deniz Turgay
    2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 199 - 204
  • [44] Secure generalized Vickrey auction using homomorphic encryption
    Suzuki, K
    Yokoo, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 239 - 249
  • [45] A Secure Distributed Learning Framework Using Homomorphic Encryption
    Ly, Stephen
    Cheng, Yuan
    Chen, Haiquan
    Krovetz, Ted
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 258 - 266
  • [46] Secure Teleoperation Control Using Somewhat Homomorphic Encryption
    Kosieradzki, Shane
    Zhao, Xiaofeng
    Kawase, Hiroaki
    Qiu, Yingxin
    Kogiso, Kiminao
    Ueda, Jun
    IFAC PAPERSONLINE, 2022, 55 (37): : 593 - 600
  • [47] Challenges of Using Homomorphic Encryption to Secure Cloud Computing
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni Hssane, Abderrahim
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 343 - 349
  • [48] Secure signal processing using fully homomorphic encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    IET INFORMATION SECURITY, 2020, 14 (01) : 51 - 59
  • [49] Secure Signal Processing Using Fully Homomorphic Encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, ACIVS 2015, 2015, 9386 : 93 - 104
  • [50] A Secure Database System using Homomorphic Encryption Schemes
    Gahi, Youssef
    Guennoun, Mouhcine
    El-Khatib, Khalil
    DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58