<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232015000200010</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Parallelizing fully homomorphic encryption for a cloud environment]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hayward]]></surname>
<given-names><![CDATA[Ryan]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Chiang]]></surname>
<given-names><![CDATA[Chia-Chu]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Market Strategies International Data Processing ]]></institution>
<addr-line><![CDATA[Little Rock Arkansas]]></addr-line>
<country>USA</country>
</aff>
<aff id="A02">
<institution><![CDATA[,University of Arkansas Department of Computer Science ]]></institution>
<addr-line><![CDATA[Little Rock Arkansas]]></addr-line>
<country>Estados Unidos de América</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2015</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2015</year>
</pub-date>
<volume>13</volume>
<numero>2</numero>
<fpage>245</fpage>
<lpage>252</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232015000200010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232015000200010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232015000200010&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Cloud computing is a boon for both business and private use, but data security concerns slow its adoption. Fully homomorphic encryption (FHE) offers the means by which the cloud computing can be performed on encrypted data, obviating the data security concerns. FHE is not without its cost, as FHE operations take orders of magnitude more processing time and memory than the same operations on unencrypted data. Cloud computing can be leveraged to reduce the time taken by bringing to bear parallel processing. This paper presents an implementation of a processing dispatcher which takes an iterative set of operations on FHE encrypted data and splits them between a number of processing engines. A private cloud was implemented to support the processing engines. The processing time was measured with 1, 2, 4, and 8 processing engines. The time taken to perform the calculations with the four levels of parallelization, as well as the amount of time used in data transfers are presented. In addition, the time the computation servers spent in each of addition, subtraction, multiplication, and division are laid out. An analysis of the time gained by parallel processing is presented. The experimental results shows that the proposed parallel processing of Gentry's encryption improves the performance better than the computations on a single node. This research provides the following contributions. A private cloud was built to support parallel processing of homomorphic encryption in the cloud. A client-server model was created to evaluate cloud computing of the Gentry's encryption algorithm. A distributed algorithm was developed to support parallel processing of the Gentry's algorithm for evaluation on the cloud. An experiment was setup for the evaluation of the Gentry's algorithm, and the results of the evaluation show that the distributed algorithm can be used to speed up the processing of the Gentry's algorithm with cloud computing.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cloud computing]]></kwd>
<kwd lng="en"><![CDATA[Fully homomorphic encryption]]></kwd>
<kwd lng="en"><![CDATA[Parallel processing]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="center"><font face="verdana" size="4"><b>Parallelizing fully homomorphic encryption for a cloud environment</b></font></p>     <p align="center"><font face="verdana" size="4">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>Ryan Hayward <sup>a</sup>*, Chia&#45;Chu Chiang<sup>b</sup></b><sup></sup></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>a</sup> Data Processing, Market Strategies International, Little Rock, Arkansas, USA. *Correponding author. E-mail address: </i><a href="mailto:rhhayward@att.net">rhhayward@att.net</a></font></p>     <p align="justify"><font face="verdana" size="2"><i> <sup>b </sup>Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas, USA</i>.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>      <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Cloud computing is a boon for both business and private use, but data security concerns slow its adoption. Fully homomorphic encryption (FHE) offers the means by which the cloud computing can be performed on encrypted data, obviating the data security concerns. FHE is not without its cost, as FHE operations take orders of magnitude more processing time and memory than the same operations on unencrypted data. Cloud computing can be leveraged to reduce the time taken by bringing to bear parallel processing. This paper presents an implementation of a processing dispatcher which takes an iterative set of operations on FHE encrypted data and splits them between a number of processing engines. A private cloud was implemented to support the processing engines. The processing time was measured with 1, 2, 4, and 8 processing engines. The time taken to perform the calculations with the four levels of parallelization, as well as the amount of time used in data transfers are presented. In addition, the time the computation servers spent in each of addition, subtraction, multiplication, and division are laid out. An analysis of the time gained by parallel processing is presented. The experimental results shows that the proposed parallel processing of Gentry's encryption improves the performance better than the computations on a single node. This research provides the following contributions. A private cloud was built to support parallel processing of homomorphic encryption in the cloud. A client&#45;server model was created to evaluate cloud computing of the Gentry's encryption algorithm. A distributed algorithm was developed to support parallel processing of the Gentry's algorithm for evaluation on the cloud. An experiment was setup for the evaluation of the Gentry's algorithm, and the results of the evaluation show that the distributed algorithm can be used to speed up the processing of the Gentry's algorithm with cloud computing.</font>	</p>     <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Cloud computing; Fully homomorphic encryption; Parallel processing.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p> 	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v13n2/v13n2a10.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Amazon EMR (2015). AWS Products &amp; Solutions. Amazon Web Services&#45; An Amazon Company. Retrieved on March 3, 2015 from: <a href="http://aws.amazon.com/elasticmapreduce" target="_blank">http://aws.amazon.com/elasticmapreduce</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864961&pid=S1665-6423201500020001000001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Cloudera. (2015). Ask Bigger Questions. Cloudera, Inc. Retrieved on March 3, 2015 from: <a href="http://cloudera.com" target="_blank">http://cloudera.com</a><a href="http://cloudera.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864962&pid=S1665-6423201500020001000002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref -->com"></a></font></p>      <!-- ref --><p align="justify"><font face="verdana" size="2">Dean, J., &amp; Ghemawat, S. (2008). Mapreduce: simplified data processing on large clusters. <i>Communications of the ACM, 51,</i> 107&#45;113.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864964&pid=S1665-6423201500020001000003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Diffie, W., &amp; Hellman, M. (1976). New directions in cryptography. <i>IEEE Transactions on Information Theory, 22,</i> 644&#45;654.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864966&pid=S1665-6423201500020001000004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">ElGamal, T. (1985). A public&#45;key cryptosystem and a signature based on discrete logarithms. <i>IEEE Transactions on Information Theory, 31,</i> 469&#45;472.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864968&pid=S1665-6423201500020001000005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Fujitsu (2013). <i>Fujitsu Develops World's First Homomorphic Encryption Technology that Enables Statistical Calculations and Biometric Authentication.</i> Fujitsu Press Releases. Retrieved on March 3, 2015 from: <a href="http://www.fujitsu.com/global/news/pr/archives/month/2013/20130828-01.html" target="_blank">http://www.fujitsu.com/global/news/pr/archives/month/2013/20130828-01.html</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864970&pid=S1665-6423201500020001000006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Gentry, C. (2009). <i>A fully homomorphic encryption scheme</i> (Ph.D. dissertation). Stanford: Department of Computer Science, Stanford University.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864971&pid=S1665-6423201500020001000007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Gentry, C., &amp; Halevi, S. (2011). <i>Implementing Gentry'sfully&#45;homomorphic encryption scheme</i> (pp. 129&#45;148). Tallinn, Estonia: International Conference on the Theory and Application of Cryptographic Techniques.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864973&pid=S1665-6423201500020001000008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Hayward, R., &amp; Chiang, C.&#45;C. (2013). <i>Building a cloud computing system in OpenStack: An experience report.</i> Taipei, Taiwan: The International Conference on Applied and Theoretical Information Systems Research. Retrieved on March 3, 2015 from: <a href="http://academic.atisr.org/ATISR2013CD/BUILDING_A_CLOUD.pdf" target="_blank">http://academic.atisr.org/ATISR2013CD/BUILDING_A_CLOUD.pdf</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864975&pid=S1665-6423201500020001000009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Hayward, R., &amp; Chiang, C.&#45;C. (2013). <i>An architecture for parallelizing fully homomorphic cryptography on cloud</i> (pp. 72&#45;77). Taichung, Taiwan: The 7<sup>th</sup> International Conference on Complex, Intelligent, and Software Intensive Systems.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864976&pid=S1665-6423201500020001000010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Kamara, S., &amp; Raykova, M. (2013). <i>Parallel homomorphic encryption</i> (pp. 213&#45;225). Okinawa, Japan: The 17<sup>th</sup> International Conference on Financial Cryptography and Data Security.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864978&pid=S1665-6423201500020001000011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </font></p> 	    <!-- ref --><p align="justify"><font face="verdana" size="2">Lauter, K., Naehrig, M., &amp; Vaikuntanathan, V. (2011). <i>Can homomorphic encryption be practical?</i> (pp. 113&#45;124). Chicago, IL: The 3<sup>rd</sup> ACM Workshop on Cloud Computing Security.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864980&pid=S1665-6423201500020001000012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </font></p> 	    <!-- ref --><p align="justify"><font face="verdana" size="2">Naone, E. (2015). 10 Breakthrough Technologies, Homomorphic Encryption&#45;Making Cloud Computing More Secure. <i>MIT Technology Review.</i> Retrieved on March 3, 2015 from: <a href="http://www2.technologyreview.com/article/423683/homomorphic&#45;encryption/ " target="_blank">http://www2.technologyreview.com/article/423683/homomorphic-encryption/ </a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864982&pid=S1665-6423201500020001000013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Ortega&#45;Cisneros, S., Cabrera&#45;Villase&ntilde;or, H.J., Raygoza&#45;Panduro, J.J., Sandoval, F., &amp; Loo&#45;Yau, R. (2014). Hardware and software co&#45;design: An architecture proposal for a network&#45;on&#45;chip switch based on bufferless data flow. <i>Journal of Applied Research and Technology, 12,</i> 153&#45;163.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864983&pid=S1665-6423201500020001000014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Paillier, P. (1999). <i>Public&#45;Key cryptosystems based on composite degree residuosity classes</i> (pp. 223&#45;238). Praque, Czech Republic: International Conference on the Theory and Application of Cryptographic Techniques.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864985&pid=S1665-6423201500020001000015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">RANDOM.ORG (2015). <i>Random Integer Generator.</i> Retrieved on March 3, 2015 from: <a href="http://www.random.org/integers/" target="_blank">http://www.random.org/integers/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864987&pid=S1665-6423201500020001000016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Rivest, R.L., Shamir, A., &amp; Adleman, L. (1978a). A method for obtaining digital signatures and public&#45;key cryptosystems. <i>Communications of the ACM, 21,</i> 120&#45;126.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864988&pid=S1665-6423201500020001000017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Rivest, R.L., Adleman, L., &amp; Dertouzos, M.L. (1978b). On data banks and privacy homomorphism. <i>Foundations of Secure Computation, 4,</i> 169&#45;180.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864990&pid=S1665-6423201500020001000018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Vukmirovic, S., Erdeljan, A., Imre, L., &amp; Capko, D. (2012). Optimal workflow scheduling in critical infrastructure systems with neural networks. <i>Journal of Applied Research and Technology, 10,</i> 114&#45;121.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4864992&pid=S1665-6423201500020001000019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<collab>Amazon EMR</collab>
<source><![CDATA[AWS Products & Solutions. Amazon Web Services- An Amazon Company]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cloudera]]></surname>
</name>
</person-group>
<source><![CDATA[Ask Bigger Questio]]></source>
<year>2015</year>
<publisher-name><![CDATA[Cloudera, Inc.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dean]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghemawat]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Mapreduce: simplified data processing on large clusters]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2008</year>
<volume>51</volume>
<page-range>107-113</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Diffie]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Hellman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[New directions in cryptography]]></article-title>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>1976</year>
<volume>22</volume>
<page-range>644-654</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[ElGamal]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A public-key cryptosystem and a signature based on discrete logarithms]]></article-title>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>1985</year>
<volume>31</volume>
<page-range>469-472</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<collab>Fujitsu</collab>
<source><![CDATA[Fujitsu Develops World's First Homomorphic Encryption Technology that Enables Statistical Calculations and Biometric Authentication]]></source>
<year>2013</year>
<publisher-name><![CDATA[Fujitsu Press Releases]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gentry]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[A fully homomorphic encryption scheme]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Stanford ]]></publisher-loc>
<publisher-name><![CDATA[Department of Computer Science, Stanford University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gentry]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Halevi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Implementing Gentry'sfully-homomorphic encryption scheme]]></source>
<year>2011</year>
<page-range>129-148</page-range><publisher-loc><![CDATA[Tallinn ]]></publisher-loc>
<publisher-name><![CDATA[International Conference on the Theory and Application of Cryptographic Techniques]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hayward]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiang]]></surname>
<given-names><![CDATA[C.-C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Building a cloud computing system in OpenStack: An experience report]]></source>
<year>2013</year>
<month>Ma</month>
<day>rc</day>
<publisher-loc><![CDATA[Taipei ]]></publisher-loc>
<publisher-name><![CDATA[The International Conference on Applied and Theoretical Information Systems Research]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hayward]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiang]]></surname>
<given-names><![CDATA[C.-C.]]></given-names>
</name>
</person-group>
<source><![CDATA[An architecture for parallelizing fully homomorphic cryptography on cloud]]></source>
<year>2013</year>
<page-range>72-77</page-range><publisher-loc><![CDATA[Taichung ]]></publisher-loc>
<publisher-name><![CDATA[The 7th International Conference on Complex, Intelligent, and Software Intensive Systems]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamara]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Raykova]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Parallel homomorphic encryption]]></source>
<year>2013</year>
<page-range>213-225</page-range><publisher-loc><![CDATA[Okinawa ]]></publisher-loc>
<publisher-name><![CDATA[The 17th International Conference on Financial Cryptography and Data Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lauter]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Naehrig]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vaikuntanathan]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Can homomorphic encryption be practical?]]></source>
<year>2011</year>
<page-range>113-124</page-range><publisher-loc><![CDATA[Chicago^eIL IL]]></publisher-loc>
<publisher-name><![CDATA[The 3rd ACM Workshop on Cloud Computing Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naone]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[10 Breakthrough Technologies, Homomorphic Encryption-Making Cloud Computing More Secure]]></article-title>
<source><![CDATA[MIT Technology Review]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega-Cisneros]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Cabrera-Villaseñor]]></surname>
<given-names><![CDATA[H.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Raygoza-Panduro]]></surname>
<given-names><![CDATA[J.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sandoval]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Loo-Yau]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Hardware and software co-design: An architecture proposal for a network-on-chip switch based on bufferless data flow]]></article-title>
<source><![CDATA[Journal of Applied Research and Technology]]></source>
<year>2014</year>
<volume>12</volume>
<page-range>153-163</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paillier]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Public-Key cryptosystems based on composite degree residuosity classes]]></source>
<year>1999</year>
<page-range>223-238</page-range><publisher-loc><![CDATA[Praque ]]></publisher-loc>
<publisher-name><![CDATA[International Conference on the Theory and Application of Cryptographic Techniques]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<collab>RANDOM.ORG</collab>
<source><![CDATA[Random Integer Generator]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Adleman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A method for obtaining digital signatures and public-key cryptosystems]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>1978</year>
<volume>21</volume>
<page-range>120-126</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Adleman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Dertouzos]]></surname>
<given-names><![CDATA[M.L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On data banks and privacy homomorphism]]></article-title>
<source><![CDATA[Foundations of Secure Computation]]></source>
<year>1978</year>
<volume>4</volume>
<page-range>169-180</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vukmirovic]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Erdeljan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Imre]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Capko]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Optimal workflow scheduling in critical infrastructure systems with neural networks]]></article-title>
<source><![CDATA[Journal of Applied Research and Technology]]></source>
<year>2012</year>
<volume>10</volume>
<page-range>114-121</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
