26
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Arithmetic operations on encrypted data

&
Pages 1-10 | Received 11 Apr 1994, Published online: 20 Mar 2007

References

  • Abadi , M. , Feigenbaum , J. and Kilian , J. 1989 . On hiding information from an oracle . Journal of Computer and System Sciences , 39 : 21 – 50 .
  • Ahituv , N. , Lapid , Y. and Neumann , S. 1987 . Processing Encrypted Data . Communications of the ACM , 30 ( 9 ) September : 777 – 780 .
  • Brickell E. F. Yacobi Y. On privacy homomorphisms April 1987 13 15 Eurocrypt87 Abstract, Amsterdam
  • Denning , D. E. 1982 . Cryptography and Data Security , Reading, , Massachusetts : Addison-Wesley . 1982
  • Rabin M. O. Digitalized Signatures and Public Key Functions as Intractable as Factorization January 1979 MIT/LCS/TR-212
  • Rivest , R. L. , Adleman , L. and Dertouzos , M. L. 1978 . “ On data banks and privacy homomorphisms ” . In Foundation of Secure Computations , New York : Academic .
  • Rosen , K. H. 1988 . Elementary Number Theory and Its Applications , Reading, , Massachusetts : Addison-Wesley .
  • Wu , T. C. , Yeh , Y. S. and Chang , C. C. 1993 . Algebraic operations on encrypted relational databases . Information Systems , 18 ( 1 ) : 55 – 62 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.