Homomorphic Encryption: Theory and Applications (original) (raw)

2013, Book Chapter in the book entitled: Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN: 980-953-307-848-4, Sen, J. (Ed.), published by INTECH Publishers, Croatia, in July 2013, pp. 1- 31.

The goal of this chapter is to present a survey of homomorphic encryption techniques and their applications. After a detailed discussion on the introduction and motivation of the chapter, we present some basic concepts of cryptography. The fundamental theories of homomorphic encryption are then discussed with suitable examples. The chapter then provides a survey of some of the classical homomorphic encryption schemes existing in the current literature. Various applications and salient properties of homomorphic encryption schemes are then discussed in detail. The chapter then introduces the most important and recent research direction in the filed - fully homomorphic encryption. A significant number of propositions on fully homomorphic encryption is then discussed. Finally, the chapter concludes by outlining some emerging research trends in this exciting field of cryptography.

Sign up for access to the world's latest research.

checkGet notified about relevant papers

checkSave papers to use in your research

checkJoin the discussion with peers

checkTrack your impact

Homomorphic encryption security - a review

International Journal of Engineering & Technology

As the Data and Technology is increasing exponentially the security and privacy issues are becoming a major concern in the present scenario, lot of security mechanisms are in to real time and practice, but even there are some bottlenecks with the existing security techniques. In this work we are giving the essence and importance of an encryption scheme called homomorphic encryption and its related issues.

A survey on Fully Homomorphic Encryption

Cloud computing is an ever-growing field in today's era.With the accumulation of data and the advancement of technology,a large amount of data is generated everyday.Storage, availability and security of the data form major concerns in the field of cloud computing.This paper focuses on homomorphic encryption, which is largely used for security of data in the cloud.Homomorphic encryption is defined as the technique of encryption in which specific operations can be carried out on the encrypted data.The data is stored on a remote server.The task here is operating on the encrypted data.There are two types of homomorphic encryption, Fully homomorphic encryption and patially homomorphic encryption.Fully homomorphic encryption allow arbitrary computation on the ciphertext in a ring, while the partially homomorphic encryption is the one in which addition or multiplication operations can be carried out on the normal ciphertext.Homomorphic encryption plays a vital role in cloud computing as the encrypted data of companies is stored in a public cloud, thus taking advantage of the cloud provider's services.Various algorithms and methods of homomorphic encryption that have been proposed are discussed in this paper.

A Survey on Fully Homomorphic Encryption and Its Applications

SCITECH, 2022

Fully homomorphic encryption (FHE) has been considered as the "holy grail" of cryptography for its adaptability as a cryptographic primitive and wide range of potential applications. It opens the door to many new capabilities with the goal to solve the IT world's problems of security and trust. FHE is a new but quickly developing technology. FHE is a cryptographic primitive that allows one to compute arbitrary functions over encrypted data. Since 2009, when Craig Gentry showed that FHE can be realized in principle, there has been a lot of new discoveries and inventions in this particular field and substantial progress has been made in finding more practical and more efficient schemes, as well. Such schemes have numerous applications since it allows users to encrypt their private data locally but still outsource the computation of the encrypted data without risking exposing the actual data. The new schemes significantly reduce the computational cost of FHE and make practical deployment within reach. However, FHE is made possible with many new problems and assumptions that are not yet well studied.

Fully Homomorphic Encryption: State of Art and Comparison

Fully homomorphic encryption (FHE) is an alternative of cryptography that allows evaluating arbitrary functions on encrypted data without the need for decryption of ciphertexts. In this article we present the state of the art of fully homomorphic encryption schemes. In particular we present a classification of several existent FHE schemes followed by a comparison of performances and complexity of these cryptosystems. Finally we will give different possible axes of research in the conclusion.

Review of How to Construct a Fully Homomorphic Encryption

Fully homomorphic encryption (FHE) allows one to perform arbitrary computation on encrypted data. From the cloud computing perspective, a FHE scheme can be used to outsource a computation to a remote cloud server without revealing the computed data to the server. This is a very attractive cryptographic primitive. Existing methods used to construct FHE schemes are complicated, and often these methods are difficult to understand except by experts in the field. This paper aims to explain how to construct a FHE scheme in an easily understandable way. We first present a general overview of FHE scheme construction. We then take the van Dijk et al FHE scheme as an example and explain how a FHE scheme is obtained from a simple integer-based encryption scheme. Our explanation gives details of the noise bound, how noise growth can be controlled and how the vanDijk scheme is implemented.

A Mathematical Approach to Fully Homomorphic Encryption

2012

Encryption is used to protect data against eavesdroppers who would otherwise intercept private communication. One party encrypts a message and sends the corresponding ciphertext to a second party, who then decrypts the ciphertext to recover the message. To prevent an untrusted third party from eavesdropping, the problem of recovering any information about the message from the ciphertext should be reasonably hard; in addition, the ciphertext should itself reveal no information about the message. Increasingly, data storage and computation is outsourced to these untrusted parties, which gives rise to the need for an encryption scheme that allows computation on the ciphertexts. The homomorphic properties of various encryption schemes have been a fascination of the cryptographic community for decades. With the rise of cloud computing and decentralized processing, the need for security in such applications is increasing. Only recently, however, has the construction of a fully homomorphic ...

A Survey on Implementations of Homomorphic Encryption Schemes

With the increased need for data confidentiality in various applications of our daily life, homomorphic encryption (HE) has emerged as a promising cryptographic topic. HE enables to perform computations directly on encrypted data (ciphertexts) without decryption in advance. Since the results of calculations remain encrypted and can only be decrypted by the data owner, confidentiality is guaranteed and any third party can operate on ciphertexts without access to decrypted data (plaintexts). Applying a homomorphic cryptosystem in a real-world application depends on its resource efficiency. Several works compared different HE schemes and gave the stakes of this research field. However, the existing works either do not deal with recently proposed HE schemes (such as CKKS) or focus only on one type of HE. In this paper, we conduct an extensive comparison and evaluation of homomorphic cryptosystems’ performance based on their experimental results. The study covers all three families of HE...

A Survey on Homomorphic Encryption in Cloud Computing

2014

Cloud Computing is the delivery of service rather than product. You can share information to the clients on the cloud. Cloud provider can be of service provider, data provider and platform provider. There is major and challenging issue of cloud like security. The advantage of cloud is reduced cost, easy maintenance and providing of resources. In this paper I have survey the approach of Homomorphic encryption in cloud. Homomorphic encryption is the technique through which we can apply the algebraic operation on ciphertext without converting it in plaintext. Homomorphic encryption is the method which performs operation on encrypted data which will provide result without decrypting that data. This method provides the same result as operation performs on row data. The scheme is said to be “fully Homomorphic’’ when we can perform (a sequence of operations) both addition and multiplication, whereas, it is “somewhat Homomorphic’’ if it supports a limited number of operations.

The Next Frontier of Security: Homomorphic Encryption in Action

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2024

Encryption is essential in preventing unauthorized access to sensitive data in light of the growing concerns about data security in cloud computing. Homomorphic encryption promises to enable secure calculations on encrypted data without the need for decryption, particularly for cloud-based operations. To evaluate the effectiveness and applicability of several homomorphic encryption algorithms for safe cloud computing, we compare and contrast them in this research paper. Partially homomorphic encryption (PHE), somewhat homomorphic encryption (SHE), and fully homomorphic encryption (FHE) are the three basic homomorphic encryption subtypes that we examine. The implications of this study can aid cloud service providers and organizations in selecting the most appropriate homomorphic encryption scheme based on their specific security requirements and performance considerations. The research contributes to the ongoing efforts to enhance data privacy in cloud computing environments, opening new possibilities for secure data processing in an increasingly connected digital world. The exploration of homomorphic encryption schemes in this study opens new avenues for research and development in the field of cryptographic techniques. As technology continues to evolve, so too must our approaches to safeguarding data. This research serves as a catalyst for further innovations in homomorphic encryption algorithms, enabling even more efficient and robust methods for secure data processing in cloud environments and beyond. The insights derived from this research paper not only empower cloud service providers and organizations to make informed decisions about selecting the most appropriate homomorphic encryption scheme but also contribute to the broader mission of fortifying data privacy and security in cloud computing.

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Homomorphic Encryption

Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021)