Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
ElGamal homomorphic characteristics were analyzed.In order to meet the need of protocol design,ElGamal variant was designed,which satisfies additive homomorphism and constant multiplication homomorphism.A homomorphism calculate protocol of linear equation passed by two private point based on the ElG...
Saved in:
| Main Authors: | Zhi-wei CHEN, Juan-mei ZHANG, Zi-chen LI |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2015-02-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015050/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Image device identification and identity privacy protection method via integration of homomorphic encryption and PRNU fingerprints
by: ZHANG Pinchang, et al.
Published: (2025-07-01) -
Elliptic curve ElGamal encryption based location privacy-preserving scheme
by: Huibin LAI, et al.
Published: (2020-06-01) -
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
by: LIU Wen1, et al.
Published: (2007-01-01) -
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
by: LIU Wen1, et al.
Published: (2007-01-01) -
First ElGamal Encryption/Decryption Scheme Based on Spiking Neural P Systems with Communication on Request, Weights on Synapses, and Delays in Rules
by: Irepan Rangel, et al.
Published: (2025-04-01)