{"id":"https://openalex.org/W2526380171","doi":"https://doi.org/10.1109/tcc.2015.2481416","title":"Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud","display_name":"Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud","publication_year":2015,"publication_date":"2015-09-23","ids":{"openalex":"https://openalex.org/W2526380171","doi":"https://doi.org/10.1109/tcc.2015.2481416","mag":"2526380171"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2015.2481416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2015.2481416","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015851735","display_name":"Ayantika Chatterjee","orcid":"https://orcid.org/0000-0001-6368-0718"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ayantika Chatterjee","raw_affiliation_strings":["SIT, Indian Institute of Technology, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"SIT, Indian Institute of Technology, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103023953","display_name":"Indranil Sengupta","orcid":"https://orcid.org/0000-0002-5438-6653"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Indranil Sengupta","raw_affiliation_strings":["SIT, Indian Institute of Technology, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"SIT, Indian Institute of Technology, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015851735"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":4.7459,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.9538805,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"6","issue":"1","first_page":"287","last_page":"300"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8585457801818848},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8569193482398987},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8099061250686646},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7868882417678833},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5900077223777771},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.47278285026550293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35750728845596313},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3282333016395569},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.31869304180145264},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1490645408630371}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8585457801818848},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8569193482398987},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8099061250686646},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7868882417678833},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5900077223777771},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.47278285026550293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35750728845596313},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3282333016395569},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.31869304180145264},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1490645408630371}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2015.2481416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2015.2481416","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W148003122","https://openalex.org/W150223756","https://openalex.org/W184005950","https://openalex.org/W1497981337","https://openalex.org/W1557386445","https://openalex.org/W1575598731","https://openalex.org/W1853548709","https://openalex.org/W1907436083","https://openalex.org/W1971286892","https://openalex.org/W1973079148","https://openalex.org/W1979120705","https://openalex.org/W1988374166","https://openalex.org/W1992282993","https://openalex.org/W1993705641","https://openalex.org/W2022047517","https://openalex.org/W2029176461","https://openalex.org/W2043035193","https://openalex.org/W2043575398","https://openalex.org/W2093766142","https://openalex.org/W2122718825","https://openalex.org/W2122744503","https://openalex.org/W2156030242","https://openalex.org/W2159915142","https://openalex.org/W2164327070","https://openalex.org/W2345502528","https://openalex.org/W2398360599","https://openalex.org/W2401602267","https://openalex.org/W2950522164","https://openalex.org/W4292154065","https://openalex.org/W6606067566","https://openalex.org/W6607546077","https://openalex.org/W6629737677","https://openalex.org/W6633271635","https://openalex.org/W6712397329","https://openalex.org/W6712817515"],"related_works":["https://openalex.org/W2372014581","https://openalex.org/W2091359829","https://openalex.org/W2379631527","https://openalex.org/W2490080356","https://openalex.org/W1484220609","https://openalex.org/W222001389","https://openalex.org/W2350287915","https://openalex.org/W3214026606","https://openalex.org/W4308992061","https://openalex.org/W2330695007"],"abstract_inverted_index":{"Cloud":[0],"provides":[1,104,176],"large":[2,25],"shared":[3],"resources":[4],"where":[5],"users":[6],"(or":[7],"foundations)":[8],"can":[9,156,186],"enjoy":[10],"the":[11,47,134,150,177,249],"facility":[12],"of":[13,21,24,64,107,152,222,268],"storing":[14,27],"data":[15,29,66,90,162,241],"or":[16,160],"executing":[17],"applications.":[18,139],"In":[19,140,201],"spite":[20],"gaining":[22],"convenience":[23],"resources,":[26],"critical":[28],"in":[30,137,224],"cloud":[31,36,44,89,123],"is":[32,38,52,91,94,119,256],"not":[33],"secured.":[34],"Hence,":[35,84],"security":[37],"an":[39,145],"important":[40],"issue":[41],"to":[42,59,74,122,130,148,163,179,194,207,246],"make":[43,144],"useful":[45],"at":[46],"enterprise":[48],"level.":[49],"Data":[50],"encryption":[51,98],"a":[53,105,120,257,266],"primary":[54],"solution":[55],"for":[56,77,132,220],"providing":[57],"confidentiality":[58],"sensitive":[60],"data.":[61,83,114,169,200],"However,":[62,125],"processing":[63,80,86],"encrypted":[65,82,88,113,168,199,262],"requires":[67],"extra":[68],"overhead,":[69],"since":[70],"repeated":[71],"encryption-decryption":[72],"need":[73],"be":[75,188],"performed":[76],"every":[78],"simple":[79],"on":[81,87,112,158,167,198],"direct":[85],"advantageous,":[92],"which":[93,165,217,243],"supported":[95],"by":[96,271],"homomorphic":[97],"schemes.":[99],"Fully":[100],"Homomorphic":[101],"Encryption":[102],"(FHE)":[103],"method":[106,267],"performing":[108],"arbitrary":[109,181,196],"operations":[110],"directly":[111],"This":[115],"seemingly":[116],"magical":[117],"idea":[118],"welcome":[121],"computing.":[124],"there":[126],"are":[127,218,244,252],"several":[128],"challenges":[129],"overcome":[131],"making":[133,235],"technology":[135],"viable":[136],"practical":[138],"this":[141,202],"paper,":[142],"we":[143,171,204,232,264],"initial":[146],"effort":[147],"highlight":[149],"problem":[151],"translating":[153],"algorithms":[154,197,223],"that":[155,173],"run":[157],"unencrypted":[159],"normal":[161],"those":[164],"operate":[166],"Here,":[170],"show":[172],"although":[174],"FHE":[175],"ability":[178],"perform":[180],"computations,":[182],"its":[183],"complete":[184],"benefit":[185],"only":[187],"obtained":[189],"if":[190],"they":[191],"also":[192],"allow":[193],"execute":[195],"pursuit,":[203],"provide":[205],"techniques":[206],"translate":[208],"basic":[209],"operators":[210],"(like":[211],"bitwise,":[212],"arithmetic":[213],"and":[214,236,239,276],"relational":[215],"operators),":[216],"used":[219],"implementation":[221],"any":[225],"high":[226],"level":[227],"language":[228],"like":[229],"C.":[230],"Subsequently,":[231],"address":[233],"decision":[234],"loop":[237],"handling":[238,261,269],"related":[240],"structures":[242],"vital":[245],"realize":[247],"when":[248],"controlling":[250],"variables":[251],"encrypted.":[253],"Since,":[254],"termination":[255,270],"major":[258],"challenge":[259],"while":[260],"data,":[263],"propose":[265],"message":[272],"passing":[273],"between":[274],"server":[275],"client.":[277]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
