O'Reilly logo

Cloud Computing Security by John R. Vacca

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 23

Computation Over Encrypted Data

Feng-Hao Liu

University of Maryland

College Park, Maryland

CONTENTS

23.1  Introduction

23.2  Homomorphic Encryption

23.2.1  An Overview

23.2.2  Homomorphic Encryption Schemes for Additions or Multiplications

23.2.3  Fully Homomorphic Encryption

23.3  Functional Encryption

23.4  Program Obfuscation

23.5  Summary

References

23.1  INTRODUCTION

In the era of the Internet, we have seen the emergence of scenarios where a user outsources data remotely on a third-party provider and can later request access or computation on the data as illustrated as Figure 23.1. Such scenarios are broadly known as cloud computing where the provider plays the role of the cloud and offers various services to the users. In addition ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required