References
[1]. Bansal, V. P., & Singh, S. (2015, December). A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs. In 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS) (pp. 1-5). IEEE.
[2]. El Makkaoui, K., Beni-Hssane, A., & Ezzati, A. (2016, September). Can hybrid Homomorphic Encryption schemes be practical? In 2016 5th International Conference on Multimedia Computing and Systems (ICMCS) (pp. 294-298). IEEE.
[3]. Gunjal, Y. S., Gunjal, M. S., & Tambe, A. R. (2018, February). Hybrid attribute based encryption and customizable authorization in cloud computing. In 2018 International Conference on Advances in Communication and Computing Technology (ICACCT) (pp. 187-190). IEEE.
[4]. Jivane, A. B. (2017, September). Time efficient privacy-preserving multi-keyword ranked search over encrypted cloud data. In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI) (pp. 497-503). IEEE.
[5]. Lee, N. Y., Chen, Z. L., & Chen, F. K. (2013, July). Cloud server aided computation for elgamal elliptic curve cryptosystem. In 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (pp. 11-15). IEEE.
[6]. Nivedhaa, R., & Justus, J. J. (2018, April). A secure erasure cloud storage system using advanced encryption standard algorithm and proxy re-encryption. In 2018 International Conference on Communication and Signal Processing (ICCSP) (pp. 0755-0759). IEEE.
[7]. Song, X., & Wang, Y. (2017, December). Homomorphic cloud computing scheme based on hybrid homomorphic encryption. In 2017 3rd IEEE International Conference on Computer and Communications (ICCC) (pp. 2450-2453). IEEE.
[8]. Sude, A., & Shinde, V. D. (2017, August). Authenticated CRF based improved ranked multi-keyword search for multi-owner model in cloud computing. In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (pp. 1-6). IEEE.
[9]. Thangapandiyan, M., Anand, P. R., & Sankaran, K. S. (2018, April). Enhanced cloud security implementation using modified ECC algorithm. In 2018 International Conference on Communication and Signal Processing (ICCSP) (pp. 1019-1022). IEEE.
[10]. Yun, A., Cheon, J. H., & Kim, Y. (2010). On homomorphic signatures for network coding. IEEE Transactions on Computers, 59(9), 1295-1296.