<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-015-03-0506</article-id>
      <article-id pub-id-type="publisher-id">29321</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>E.3 - DATA ENCRYPTION</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Advances in Homomorphic Cryptosystems</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Akinwande</surname>
            <given-names>Mufutau</given-names>
          </name>
          <email xlink:type="simple">mboakinwande@yahoo.com</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">Lagos State University, Lagos, Nigeria</addr-line>
        <institution>Lagos State University</institution>
        <addr-line content-type="city">Lagos</addr-line>
        <country>Nigeria</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Mufutau Akinwande (<email xlink:type="simple">mboakinwande@yahoo.com</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2009</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>02</month>
        <year>2009</year>
      </pub-date>
      <volume>15</volume>
      <issue>3</issue>
      <fpage>506</fpage>
      <lpage>522</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/03C353BD-64D3-54A8-AA89-8661B82CE771">03C353BD-64D3-54A8-AA89-8661B82CE771</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/7000657">7000657</uri>
      <permissions>
        <copyright-statement>Mufutau Akinwande</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>During the last few years homomorphic encryption techniques have been studied extensively since they have become more and more important in many different cryptographic protocols such as voting protocols, lottery protocols, anonymity, privacy, and electronic auctions.  This paper critically summarizes the current state-of-art of homomorphic cryptosystems. It recalls the basic ideas, discusses their parameters, performances and security issues. And, finally we present their capabilities in the future applications.  Attention: Based on the investigations by the J.UCS office, this article needs to be retracted due to plagiarism issue. The paper was found to duplicate word by word without proper citation significant parts of the content from  Fontaine, C., Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. Journal of Information Security, 1, 41-50. Retrieved from http://downloads.hindawi.com/journals/is/2007/013801.pdf  As a consequence, this conference paper has been formally retracted, and the relevant parties informed about this step. The J.UCS office apologizes to the authors of the plagiarized article.  One of the conditions of submission of a paper for publication is that authors declare explicitly that the paper is not under consideration for publication elsewhere. Re-use of any data should be appropriately cited. As such this article represents a severe abuse of the scientific publishing system. The scientific community takes a very strong view on this matter and apologies are offered to the authors of the original article and readers of the journal that this was not detected during the submission process. August 4, 2014.</p>
      </abstract>
    </article-meta>
  </front>
</article>
