Confidential Greedy Graph Algorithm

Daniel Waszkiewicz , Aleksandra Horubała , Piotr Sapiecha , Michał Andrzejczak

Abstract

Confidential algorithm for the approximate graph vertex covering problem is presented in this article. It can preserve privacy of data at every stage of the computation, which is very important in context of cloud computing. Security of our solution is based on fully homomorphic encryption scheme. The time complexity and the security aspects of considered algorithm are described.
Author Daniel Waszkiewicz (FEIT / IT)
Daniel Waszkiewicz,,
- The Institute of Telecommunications
, Aleksandra Horubała (FEIT / IT)
Aleksandra Horubała,,
- The Institute of Telecommunications
, Piotr Sapiecha (FEIT / IT)
Piotr Sapiecha,,
- The Institute of Telecommunications
, Michał Andrzejczak - Wojskowa Akademia Techniczna (WAT) [Wojskowa Akademia Techniczna]
Michał Andrzejczak,,
-
-
Journal seriesInternational Journal of Electronics and Telecommunications [do 2009: Electronics and Telecommunications Quarterly], ISSN 2081-8491, e-ISSN 2300-1933, [0867-6747], (B 15 pkt)
Issue year2018
Vol64
No2
Pages179-183
Publication size in sheets0.5
Keywords in Englishcryptography, fully homomorphic encryption, confidential graph algorithm, cloud computing
ASJC Classification2208 Electrical and Electronic Engineering; 1705 Computer Networks and Communications
DOIDOI:10.24425/119367
URL http://ijet.pl/index.php/ijet/article/view/10.24425-119367/456
projectThe Develpment of Digital Communicatios. Project leader: Siuzdak Jerzy, , Phone: +48 22 234-7868, start date 07-06-2017, end date 30-11-2018, IT/2017/statut, Completed
WEiTI Działalność statutowa
Languageen angielski
File
2018 Sapiecha Confidential Greedy Graph Algorithm.pdf 1.15 MB
Score (nominal)15
ScoreMinisterial score = 15.0, 25-06-2019, ArticleFromJournal
Publication indicators WoS Citations = 0; Scopus Citations = 0; Scopus SNIP (Source Normalised Impact per Paper): 2017 = 0.693
Citation count*
Cite
Share Share

Get link to the record


* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Back