Article citationsMore>>
                
                    Coron, J.S., Mandal, A., Naccache, D., et al. (2011) Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In: Rogaway, P., Ed., CRYPTO 2011. LNCS, Vol. 6841, 487-504.
                
                
                    has been cited by the following article:
                
                
                    
                            - 
                                
                                    TITLE: 
                        
                            An Improved Multiple to One Fully Homomorphic Encryption on the Integers
                                
                                
                                    AUTHORS: 
                                            Chaoju Hu, Jianwei Zhao 
                                                    
                                                        KEYWORDS: 
                        Fully Homomorphic Encryption, Multipart to One Fully Homomorphism Encryption, Approximate GCD Problem, Sparse-Subset Sum Problem 
                                                    
                                                    
                                                        JOURNAL NAME: 
                        Journal of Computer and Communications,  
                        Vol.6 No.9, 
                        September
                                                        12,
                        2018
                                                    
                                                    
                                                        ABSTRACT: The public key of the integer homomorphic encryption scheme which was proposed by Van Dijk et al. is long, so the scheme is almost impossible to use in practice. By studying the scheme and Coron’s public key compression technique, a scheme which is able to encrypt n bits plaintext once was obtained. The scheme improved the efficiency of the decrypting party and increased the number of encrypting parties, so it meets the needs of cloud computing better. The security of the scheme is based on the approximate GCD problem and the sparse-subset sum problem.