IT Security techniques - Encryption algorithms - Part 6: Homomorphic encryption
- Exponential ElGamal encryption;
- Paillier encryption.
For each mechanism, this document specifies the process for:
- generating parameters and the keys of the involved entities;
- encrypting data;
- decrypting encrypted data; and
- homomorphically operating on encrypted data.
Annex A defines the object identifiers assigned to the mechanisms specified in this document. Annex B provides numerical examples.
|Publication type||International Standard|
|TC/SC||ISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protectionrss|
|ICS||35.030 - IT Security|
|File size||1222 KB|
The following test report forms are related:
Share your publications
Learn how to share your publications with your colleagues, using networking options.