{"id":"https://openalex.org/W3207790264","doi":"https://doi.org/10.1080/23799927.2021.1988714","title":"A note on fully homomorphic encryption of real-life data","display_name":"A note on fully homomorphic encryption of real-life data","publication_year":2021,"publication_date":"2021-10-02","ids":{"openalex":"https://openalex.org/W3207790264","doi":"https://doi.org/10.1080/23799927.2021.1988714","mag":"3207790264"},"language":"en","primary_location":{"id":"doi:10.1080/23799927.2021.1988714","is_oa":true,"landing_page_url":"https://doi.org/10.1080/23799927.2021.1988714","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/23799927.2021.1988714?needAccess=true","source":{"id":"https://openalex.org/S4210234901","display_name":"International Journal of Computer Mathematics Computer Systems Theory","issn_l":"2379-9927","issn":["2379-9927","2379-9935"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics: Computer Systems Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.tandfonline.com/doi/pdf/10.1080/23799927.2021.1988714?needAccess=true","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011373327","display_name":"Delaram Kahrobaei","orcid":"https://orcid.org/0000-0001-5467-7832"},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Delaram Kahrobaei","raw_affiliation_strings":["City University of New York, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"City University of New York, New York, NY, USA","institution_ids":["https://openalex.org/I174216632"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069099041","display_name":"Vladimir Shpilrain","orcid":"https://orcid.org/0000-0003-2239-7996"},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vladimir Shpilrain","raw_affiliation_strings":["City University of New York, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"City University of New York, New York, NY, USA","institution_ids":["https://openalex.org/I174216632"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069099041"],"corresponding_institution_ids":["https://openalex.org/I174216632"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15139734,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"4","first_page":"381","last_page":"385"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8998485803604126},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7874162197113037},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.6753914952278137},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6587768793106079},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5973544120788574},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5195858478546143},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4952467978000641},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4893195331096649},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.480227530002594},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.46253493428230286},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.458680659532547},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.44354158639907837},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4381035566329956},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39954233169555664},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.299257755279541},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13812151551246643},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.05854901671409607}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8998485803604126},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7874162197113037},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.6753914952278137},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6587768793106079},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5973544120788574},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5195858478546143},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4952467978000641},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4893195331096649},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.480227530002594},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.46253493428230286},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.458680659532547},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.44354158639907837},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4381035566329956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39954233169555664},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.299257755279541},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13812151551246643},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.05854901671409607},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/23799927.2021.1988714","is_oa":true,"landing_page_url":"https://doi.org/10.1080/23799927.2021.1988714","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/23799927.2021.1988714?needAccess=true","source":{"id":"https://openalex.org/S4210234901","display_name":"International Journal of Computer Mathematics Computer Systems Theory","issn_l":"2379-9927","issn":["2379-9927","2379-9935"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics: Computer Systems Theory","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1080/23799927.2021.1988714","is_oa":true,"landing_page_url":"https://doi.org/10.1080/23799927.2021.1988714","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/23799927.2021.1988714?needAccess=true","source":{"id":"https://openalex.org/S4210234901","display_name":"International Journal of Computer Mathematics Computer Systems Theory","issn_l":"2379-9927","issn":["2379-9927","2379-9935"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics: Computer Systems Theory","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1697401030","display_name":null,"funder_award_id":"20-01-00465","funder_id":"https://openalex.org/F4320313621","funder_display_name":"Russian Foundation for Fundamental Investigations"}],"funders":[{"id":"https://openalex.org/F4320313621","display_name":"Russian Foundation for Fundamental Investigations","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3207790264.pdf","grobid_xml":"https://content.openalex.org/works/W3207790264.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W236632755","https://openalex.org/W913176383","https://openalex.org/W1992282993","https://openalex.org/W2031533839","https://openalex.org/W2152926062","https://openalex.org/W2156030242","https://openalex.org/W2798297334","https://openalex.org/W2901455276","https://openalex.org/W2905984083","https://openalex.org/W2962728853","https://openalex.org/W3030227731","https://openalex.org/W3042006926","https://openalex.org/W3114023788"],"related_works":["https://openalex.org/W4315815885","https://openalex.org/W2387840805","https://openalex.org/W2545514196","https://openalex.org/W4240313302","https://openalex.org/W3143289714","https://openalex.org/W2188276378","https://openalex.org/W2111426419","https://openalex.org/W2361619969","https://openalex.org/W2396533199","https://openalex.org/W3118757263"],"abstract_inverted_index":{"The":[0,84],"purpose":[1],"of":[2,25,33,46,68,76],"this":[3,52],"short":[4],"paper":[5],"is":[6,36,88],"to":[7,57],"explain":[8],"the":[9,23,69,73,101],"difference":[10],"between":[11,82],"encrypting":[12,16],"real-life":[13,34,47],"data":[14,35,48],"and":[15],"elements":[17],"with":[18],"a":[19,43,50],"ring":[20],"structure":[21],"in":[22,37,49],"context":[24],"fully":[26,59,91],"homomorphic":[27],"encryption":[28,32,78,86],"(FHE).":[29],"Specifically,":[30],"our":[31,77],"two":[38],"stages.":[39],"First,":[40],"we":[41,94],"use":[42],"private-key":[44],"embedding":[45,53],"ring;":[51],"does":[54],"not":[55,90],"have":[56],"be":[58],"homomorphic.":[60],"This":[61],"private":[62,110],"embedding,":[63],"speaking":[64],"informally,":[65],"takes":[66],"most":[67,102],"security":[70],"burden":[71],"off":[72],"second":[74],"part":[75],"procedure,":[79],"namely":[80],"FHE":[81],"rings.":[83],"whole":[85],"function":[87],"then":[89],"homomorphic,":[92],"but":[93],"show":[95],"that":[96],"it":[97],"still":[98],"provides":[99],"for":[100],"popular":[103],"functionalities":[104],"one":[105],"expects":[106],"from":[107],"FHE,":[108],"including":[109],"search":[111],"on":[112],"encrypted":[113],"data.":[114]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
