
Chapter 13
Privacy and Integrity
of Outsourced Data Storage
and Processing
Dongxi Liu
Shenlu Wang
John Zic
CONTENTS
13.1 Overview ......................................................................... 326
13.2 Lightweight Homomorphic Encryption ............................................ 326
13.2.1 Key generation ........................................................... 327
13.2.2 Encryption and decryption ................................................ 327
13.2.3 An example of encryption and decryption ................................. 328
13.2.3.1 An instance of K(4) ........................................ 328
13.2.3.2 Example of encryption and ...