Secure pattern matching using somewhat homomorphic encryption
Citations
146 citations
141 citations
112 citations
111 citations
101 citations
Cites methods from "Secure pattern matching using somew..."
...Similarly, Yasuda et al. (2013) used somewhat homomorphic encryption for privacy-preserving DNA pattern matching....
[...]
References
[...]
40,330 citations
"Secure pattern matching using somew..." refers background in this paper
...• the NTRU encryption based schemes [30]....
[...]
...After Gentry’s breakthrough, FHE is expected to be applied to various areas including cloud computing, and a number of new schemes, improvements, and implementations have been proposed (see [7, 8, 12, 18, 21, 22, 30] for examples of recent work)....
[...]
7,008 citations
"Secure pattern matching using somew..." refers background or methods in this paper
...Actually, typical applications of additively homomorphic encryption such as the Paillier scheme [34] are electronic voting and e-cash....
[...]
...Homomorphic encryption schemes proposed before 2000 can only support simple operations such as either additions or multiplications on encrypted data (see [15, 23, 34] for examples), and hence applications of these schemes are very...
[...]
...a text of 10, 000 and 100, 000 characters), in using the Paillier scheme [34] of 1024 bit key length and using the DNA alphabet as a character (the performance of 5PM increases linearly in the text size)....
[...]
5,770 citations
"Secure pattern matching using somew..." refers background in this paper
...In 2009, Gentry in [19] proposed a concrete construction of a fully homomorphic encryption (FHE) scheme supporting arbitrary computations on encrypted data....
[...]
...• ideal lattices based schemes [19, 20, 36], • integers based schemes [12, 14, 17], • the learning with errors (LWE) based schemes [8, 9, 10, 18], and...
[...]
1,924 citations
"Secure pattern matching using somew..." refers background or methods in this paper
...In particular, the polynomial-CRT packing method is used in the work [22] to evaluate the AES circuit homomorphically by the BGV scheme of [8]....
[...]
...After Gentry’s breakthrough, FHE is expected to be applied to various areas including cloud computing, and a number of new schemes, improvements, and implementations have been proposed (see [7, 8, 12, 18, 21, 22, 30] for examples of recent work)....
[...]
...the authors in [22] used σ ≈ 4 for evaluating the AES circuit homomorphically in the leveled FHE scheme of [8])....
[...]
...Our packing method makes use of the structure of the special ring Z[x]/(x + 1), and it can be applied to the BGV scheme of [8], and the scheme recently proposed by Fan and Vercauteren [18] (the performances in these schemes are estimated to be almost the same as in the scheme of [28] used in this paper)....
[...]
...• ideal lattices based schemes [19, 20, 36], • integers based schemes [12, 14, 17], • the learning with errors (LWE) based schemes [8, 9, 10, 18], and...
[...]
1,754 citations
"Secure pattern matching using somew..." refers background or methods in this paper
...The first scheme supporting both additions and multiplications is the BGN scheme [6] proposed in 2005, which is based on pairings over elliptic curves....
[...]
...However, it cannot be applied to the BGN scheme [6] since it is based on pairings over elliptic curves....
[...]