Confidential Greedy Graph Algorithm

Daniel Waszkiewicz , Aleksandra Horubała , Piotr Sapiecha , Michał Andrzejczak


Confidential algorithm for the approximate graph vertex covering problem is presented in this article. It can preserve privacy of data at every stage of the computation, which is very important in context of cloud computing. Security of our solution is based on fully homomorphic encryption scheme. The time complexity and the security aspects of considered algorithm are described.
Author Daniel Waszkiewicz (FEIT / IT)
Daniel Waszkiewicz,,
- The Institute of Telecommunications
, Aleksandra Horubała (FEIT / IT)
Aleksandra Horubała,,
- The Institute of Telecommunications
, Piotr Sapiecha (FEIT / IT)
Piotr Sapiecha,,
- The Institute of Telecommunications
, Michał Andrzejczak - Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego (WAT) [Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego (WAT)]
Michał Andrzejczak,,
- Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Journal seriesInternational Journal of Electronics and Telecommunications, [do 2009: Electronics and Telecommunications Quarterly], ISSN 2081-8491, e-ISSN 2300-1933, [0867-6747], (B 15 pkt)
Issue year2018
Publication size in sheets0.5
Keywords in Englishcryptography, fully homomorphic encryption, confidential graph algorithm, cloud computing
ASJC Classification2208 Electrical and Electronic Engineering; 1705 Computer Networks and Communications
ProjectThe Develpment of Digital Communicatios. Project leader: Siuzdak Jerzy, , Phone: +48 22 234-7868, start date 07-06-2017, end date 30-11-2018, IT/2017/statut, Completed
WEiTI Działalność statutowa
Languageen angielski
2018 Sapiecha Confidential Greedy Graph Algorithm.pdf 1.15 MB
Score (nominal)15
Score sourcejournalList
ScoreMinisterial score = 15.0, 02-02-2020, ArticleFromJournal
Publication indicators WoS Citations = 0; Scopus Citations = 0; Scopus SNIP (Source Normalised Impact per Paper): 2018 = 0.592
Citation count*
Share Share

Get link to the record

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Are you sure?