ExLibris header image
SFX Logo
Title: Limitations on information-theoretically-secure quantum homomorphic encryption
Source:

Physical Review A: Atomic, Molecular, and Optical Physics [1050-2947] yr:2014


Collapse list of basic services Basic
Full text
Full text available via American Physical Society Journals
GO
Document delivery
Request document via Library/Bibliothek GO
Users interested in this article also expressed an interest in the following:
1. Martins, P. "A Survey on Fully Homomorphic Encryption." ACM computing surveys 50.6: 1-33. Link to SFX for this item
2. Acar, A. "A Survey on Homomorphic Encryption Schemes." ACM computing surveys 51.4: 1-35. Link to SFX for this item
3. "A Homomorphic Encryption-Based Private Collaborative Distributed Energy Management System." IEEE transactions on smart grid. 12.6: 5233-5243. Link to SFX for this item
4. "Protecting Private Data by Honey Encryption." Security and communication networks. 2017: 1-9. Link to SFX for this item
5. "Practical homomorphic encryption: A survey." Circuits and Systems (ISCAS), 2014 IEEE International Symposium on 2792-2795. Link to SFX for this item
6. Bernstein, Daniel J. "Post-quantum cryptography." Nature. 549.7671: 188-194. Link to SFX for this item
7. "Decentralized attribute-based encryption and data sharing scheme in cloud storage." China Communications/#/China Communications [[ZHONGGUO TONGXIN]] 15.2: 138-152. Link to SFX for this item
8. Gisin, N. "Quantum cryptography." Reviews of modern physics 74.1 (2002): 145-195. Link to Full Text for this item Link to SFX for this item
9. "A comparative survey on data encryption Techniques: Big data perspective." Materials Today: Proceedings 46: 11035-11039. Link to SFX for this item
10. "Cost Effective RADIUS Authentication for Wireless Clients." Database systems journal. I.2: 27-32. Link to SFX for this item
11. Natanael, D. "Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC)." Procedia computer science 135 (2018): 283-291. Link to SFX for this item
12. Fehr, S. "Quantum Cryptography." Foundations of Physics 40.5 (2010): 494-531. Link to Full Text for this item Link to SFX for this item
13. "Private routing and ride‐sharing using homomorphic encryption." IET Cyber-Physical Systems theory & applications 5.4: 311-320. Link to SFX for this item
14. Juels, A. "Honey Encryption: Security Beyond the Brute-Force Bound." Springer Berlin Heidelberg :, 2014. 656-310. Link to SFX for this item
15. Azab, M. "ChameleonSoft: Software Behavior Encryption for Moving Target Defense." Mobile Networks and Applications 18.2 (2013): 271-292. Link to SFX for this item
16. Bernstein, Daniel J. "Post-Quantum Cryptography." Post-Quantum Cryptography. Springer Berlin Heidelberg, 2009. Link to SFX for this item
17. Quisquater, JJ. "Fast decipherment algorithm for RSA public-key cryptosystem." Electronics letters 18.21 (1982): 905-907. Link to SFX for this item
18. Shor, Peter W. "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer." SIAM journal on computing 26.5 (1997): 1484-1509. Link to SFX for this item
View More...
View Less...
Select All Clear All

Expand list of advanced services Advanced