Published December 25, 2024 | Version v2
Journal article Open

YETARLI GOMOMORFIK SHIFRLASH ALGORITMLARI YORDAMIDA AXBOROTNI KRIPTOGRAFIK HIMOYALASH

  • 1. Muhammad al-Alxorazmiy nomidagi Toshkent axborot texnologiyalari universiteti, Toshkent, O'zbekiston

Description

An'anaviy shifrlash algoritmlari ma'lumotlarni saqlashda va uzatilishida axborot xavfsizligini ta'minlaydi, lekin, axborotga ishlov berish jarayonlarida konfidensiallikni ta'minlamaydi. Bunday muammo bulutli tuzilmalardagi zaifliklarning barchasini yoki hech bo'lmaganda bir qismini bartaraf etadigan xavfsizlik tizimini yaratish vazifasini keltirib chiqaradi. Ushbu maqolada gomomorfik shifrlash algoritmlari va uning turlari, yetarli (somewhat) gomomorfik shifrlash algoritmlarining afzalliklari va ularni amalga oshirishdagi muammolar tahlil qilinadi

Files

final_21_547-130-135-Xudoynazarov.pdf

Files (884.8 kB)

Name Size Download all
md5:5fed36c7a2018ab52f3adf1f19d7de3b
884.8 kB Preview Download

Additional details

References

  • Rivest R. L. et al. On data banks and privacy homomorphisms //Foundations of secure computation. – 1978. – Т. 4. – №. 11. – С. 169-180.
  • Rass S., Slamanig D. Cryptography for security and privacy in cloud computing. – Artech House, 2013.
  • Shafi G., Micali S. Probabilistic encryption //Journal of computer and system sciences. – 1984. – Т. 28. – №. 2. – С. 270-299.
  • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms //IEEE transactions on information theory. – 1985. – Т. 31. – №. 4. – С. 469-472.
  • Benaloh J. Dense probabilistic encryption //Proceedings of the workshop on selected areas of cryptography. – 1994. – С. 120-128.
  • Paillier P. Public-key cryptosystems based on composite degree residuosity classes //International conference on the theory and applications of cryptographic techniques. – Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. – С. 223-238.
  • Boneh D., Goh E. J., Nissim K. Evaluating 2-DNF formulas on ciphertexts //Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings 2. – Springer Berlin Heidelberg, 2005. – С. 325-341.
  • Chatterjee A., Aung K. M. M. Fully homomorphic encryption in real world applications. – Singapore: Springer, 2019.
  • Koç Ç. K., Özdemir F., Özger Z. Ö. Partially Homomorphic Encryption. – Springer, 2021. – С. 37-41.
  • Jain N., Cherukuri A. K. Revisiting Fully Homomorphic Encryption Schemes //arXiv preprint arXiv:2305.05904. – 2023.
  • Wainakh A. Homomorphic encryption for data security in cloud computing: дис. – Middle East Technical University, 2018.