Show simple item record

dc.contributor.authorOmollo, Richard
dc.contributor.authorOkelo, N. B.
dc.date.accessioned2021-03-29T13:39:02Z
dc.date.available2021-03-29T13:39:02Z
dc.date.issued2016-04-12
dc.identifier.urihttp://ir.jooust.ac.ke:8080/xmlui/handle/123456789/9281
dc.description.abstractAddition-Composition Fully Homomorphic Encryption is given in this paper to solve data security equation in cloud computation. An earlier attempt to solve security problem has been proposed by Craig Gentry, who combined additive and multiplicative operations, using lattice-based cryptography. Its construction started as a somewhat homomorphic encryption scheme that evaluates low-degree polynomials over encrypted data. He then modified it to make it bootstrappable and showed that any bootstrappable fully homomorphic encryption scheme can be converted into a fully homomorphic encryption. Subsequent efforts to improve on Craig’s work still favor his approach, i.e. bootstrapping homomorphic cryptosystems with noisy ciphertexts into fully homomorphic cryptosystems. The approach in the design of the scheme in this paper is based on combining additive and composition properties making it complex to compromise. Finally, the scheme enables secure computation of cloud data without exposing it to deliberate risk.en_US
dc.language.isoenen_US
dc.publisherResearchGateen_US
dc.subjectHomomorphismen_US
dc.subjectEncryptionen_US
dc.subjectAdditionen_US
dc.subjectCompositionen_US
dc.subjectCloud computingen_US
dc.titleInternational Journal of Academic Studies on Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Schemeen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record