Show simple item record

dc.contributor.authorOmollo, R.O
dc.contributor.authorOkelo, B.N.
dc.date.accessioned2021-04-20T06:24:46Z
dc.date.available2021-04-20T06:24:46Z
dc.date.issued2016-04-12
dc.identifier.urihttp://ir.jooust.ac.ke:8080/xmlui/handle/123456789/9527
dc.description.abstractAddition-Composition Fully Homomorphic Encryption is given inthis paper to solve data security equation in cloud computation. An earlierattempt to solve security problem has been proposed by Craig Gentry,who combined additive and multiplicative operations, using lattice-basedcryptography. Its construction started as a somewhat homomorphicencryption scheme that evaluates low-degree polynomials over encrypteddata. He then modified it to make it bootstrappable and showed that any bootstrappable fully homomorphic encryption scheme can be convertedinto a fully homomorphic encryption. Subsequent efforts to improve on Craig’s work still favor his approach, i.e. bootstrapping homo morphiccryptosystems with noisy ciphertexts into fully homomorphiccryptosystems. The approach in the design of the scheme in this paper is based on combining additive and composition properties making itcomplex to compromise. Finally, the scheme enables secure computationof cloud data without exposing it to deliberate risk.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Academic Studiesen_US
dc.subjectHomomorphismen_US
dc.subjectEncryptionen_US
dc.subjectAdditionen_US
dc.subjectCompositionen_US
dc.subjectCloud computingen_US
dc.titleOn Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Schemeen_US
dc.typeArticleen_US


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record