@article {El-Yahyaoui2019150, title = {Optimizations in fully homomorphic encryption}, journal = {Lecture Notes in Networks and Systems}, volume = {49}, year = {2019}, note = {cited By 0}, pages = {150-166}, doi = {10.1007/978-3-319-97719-5_11}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063268513\&doi=10.1007\%2f978-3-319-97719-5_11\&partnerID=40\&md5=d99d4c66a9844c9bde0bf03273bef13b}, author = {El-Yahyaoui, A. and Ech-Cherif El Kettani, M.D.} } @conference {El-Yahyaoui20181, title = {Evaluating and gates over encrypted data in cloud computing}, booktitle = {Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018}, year = {2018}, pages = {1-8}, doi = {10.1109/COMMNET.2018.8360255}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048328547\&doi=10.1109\%2fCOMMNET.2018.8360255\&partnerID=40\&md5=09228d71a4faa4f19cc5b91d7453e450}, author = {El-Yahyaoui, A. and El Kettani, M.D.E.-C.} } @conference {El-Yahyaoui20181, title = {A new cryptographic method for cloud computing}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-8}, doi = {10.1109/CloudTech.2017.8284705}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046662752\&doi=10.1109\%2fCloudTech.2017.8284705\&partnerID=40\&md5=64b47be3d219a15b30f943cb0b474165}, author = {El-Yahyaoui, A. and El Kettani, M.D.E.-C.} } @conference {El-Yahyaoui2017, title = {Fully homomorphic encryption: Searching over encrypted cloud data}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Searching over encrypted data is a very important property that can offer some encryption schemes. It means performing queries on encrypted data in the absence of purpose to decryption, which permits to preserve confidentiality of sensitive data. Private Information Retrieval (PIR) is an essential protocol when selected information from remote databases is wanted to be done in secrecy. Fully homomorphic encryption is a revolutionary domain of cryptography that allows processing encrypted data without the need of any prior decryption, thus generating an encrypted result that corresponds the result of operations performed on the plaintext. In this paper we will exploit the important property that can offer the powerful fully homomorphic encryption to show how to realize a PIR protocol and how to search over encrypted data in a cloud context. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090364}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028468174\&doi=10.1145\%2f3090354.3090364\&partnerID=40\&md5=05718b11465e15a17c5d7408aa836911}, author = {El-Yahyaoui, A. and Ec-Chrif El Kettani, M.D.} } @conference {El-Yahyaoui2017, title = {A verifiable fully homomorphic encryption scheme to secure big data in cloud computing}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {Performing smart computations in a context of cloud computing and big data is highly appreciated today. Fully homomorphic encryption (FHE) is a smart category of encryption schemes that allows working with the data in its encrypted form. It permits us to preserve confidentiality of our sensible data and to benefit from cloud computing powers. Currently, it has been demonstrated by many existing schemes that the theory is feasible but the efficiency needs to be dramatically improved in order to make it usable for real applications. One subtle difficulty is how to efficiently handle the noise. This paper aims to introduce an efficient and verifiable FHE based on a new mathematic structure that is noise free. {\textcopyright}2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238186}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041451124\&doi=10.1109\%2fWINCOM.2017.8238186\&partnerID=40\&md5=1fa52d884b4c793832bb38dddfe4a232}, author = {El-Yahyaoui, A. and Ech-Chrif El Kettani, M.D.} }