Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

University of Wollongong

Faculty of Informatics - Papers (Archive)

Series

2012

Encryption

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Further Analysis Of A Practical Hierarchical Identity-Based Encryption Scheme, Ying Sun, Yong Yu, Yi Mu Jan 2012

Further Analysis Of A Practical Hierarchical Identity-Based Encryption Scheme, Ying Sun, Yong Yu, Yi Mu

Faculty of Informatics - Papers (Archive)

No abstract provided.


Reaction Attack On Outsourced Computing With Fully Homomorphic Encryption Schemes, Zhenfei Zhang, Thomas Plantard, Willy Susilo Jan 2012

Reaction Attack On Outsourced Computing With Fully Homomorphic Encryption Schemes, Zhenfei Zhang, Thomas Plantard, Willy Susilo

Faculty of Informatics - Papers (Archive)

Outsourced computations enable more efficient solutions towards practical problems that require major computations. Nevertheless, users’ privacy remains as a major challenge, as the service provider can access users’ data freely. It has been shown that fully homomorphic encryption schemes might be the perfect solution, as it allows one party to process users’ data homomorphically, without the necessity of knowing the corresponding secret keys. In this paper, we show a reaction attack against full homomorphic schemes, when they are used for securing outsourced computation. Essentially, our attack is based on the users’ reaction towards the output generated by the cloud. Our …