Cloud-RSA: An Enhanced Homomorphic Encryption Scheme

被引:0
作者
El Makkaoui, Khalid [1 ]
Ezzati, Abdellah [1 ]
Beni-Hssane, Abderrahim [2 ]
机构
[1] Univ Hassan 1, FST, LAVETE Lab, BP 577, Settat 26000, Morocco
[2] Chouaib Doukkali Univ, Fac Sci, Dept Comp Sci, LAROSERI Lab, El Jadida, Morocco
来源
EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES | 2017年 / 520卷
关键词
Cloud-RSA; RSA; Homomorphic encryption; Confidentiality; Third party; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Homomorphic encryption technique is a form of encryption which allows specific types of computations to be performed on encrypted data and generates an encrypted result. The decrypted result of any operation is the same such as working directly on raw data. The ability to perform computations on ciphertexts makes homomorphic encryption a widely adopted technique for ensuring confidentiality of both storage and treatment of outsourced data into a third party. Indeed, the RSA is the first asymmetric-key encryption scheme with a homomorphic property. Unfortunately, many attacks can threaten the encrypted data confidentiality of this scheme. In this paper, we will address the standard RSA drawbacks by suggesting an enhanced encryption scheme of it, which keeps a homomorphic property and resists more the well-known attacks against RSA.
引用
收藏
页码:471 / 480
页数:10
相关论文
共 12 条
  • [1] [Anonymous], 1993, Lecture Notes in Mathematics
  • [2] Bellare M., 1994, P EUROCRYPT, P92, DOI DOI 10.1007/BFB0053428
  • [3] Boneh D, 1999, LECT NOTES COMPUT SC, V1592, P1
  • [4] BONEH D, 1999, NOT AM MATH SOC, V46, P203
  • [5] Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    Coppersmith, D
    [J]. JOURNAL OF CRYPTOLOGY, 1997, 10 (04) : 233 - 260
  • [6] Feil T., 2014, 1 COURSE ABSTRACT AL
  • [7] FACTORING INTEGERS WITH ELLIPTIC-CURVES
    LENSTRA, HW
    [J]. ANNALS OF MATHEMATICS, 1987, 126 (03) : 649 - 673
  • [8] Factoring RSA Moduli with Weak Prime Factors
    Nitaj, Abderrahmane
    Rachidi, Tajjeeddine
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 361 - 374
  • [9] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
  • [10] Stinson DR., 2006, Cryptography Theory and Practice. Third Edition