Corpus ID: 12737699

A Guide to Fully Homomorphic Encryption

@article{Armknecht2015AGT,
  title={A Guide to Fully Homomorphic Encryption},
  author={Frederik Armknecht and C. Boyd and Christopher Carr and Kristian Gj{\o}steen and Angela J{\"a}schke and Christian A. Reuter and M. Strand},
  journal={IACR Cryptol. ePrint Arch.},
  year={2015},
  volume={2015},
  pages={1192}
}
  • Frederik Armknecht, C. Boyd, +4 authors M. Strand
  • Published 2015
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • Fully homomorphic encryption (FHE) has been dubbed the holy grail of cryptography, an elusive goal which could solve the IT world’s problems of security and trust. Research in the area exploded after 2009 when Craig Gentry showed that FHE can be realised in principle. Since that time considerable progress has been made in finding more practical and more efficient solutions. Whilst research quickly developed, terminology and concepts became diverse and confusing so that today it can be difficult… CONTINUE READING
    99 Citations

    Figures, Tables, and Topics from this paper

    Explore Further: Topics Discussed in This Paper

    Fully homomorphic encryption with applications to electronic voting
    An Overview on Homomorphic Encryption Algorithms
    • PDF
    Fully homomorphic encryption must be fat or ugly?
    • 3
    • PDF
    A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    • 76
    • PDF

    References

    SHOWING 1-10 OF 76 REFERENCES
    Fully Homomorphic Encryption without bootstrapping
    • M. Yagisawa
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 177
    • PDF
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
    • 836
    • PDF
    On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption
    • 31
    • PDF
    Can homomorphic encryption be practical?
    • 846
    • Highly Influential
    • PDF
    Practical applications of homomorphic encryption
    • 22
    Faster Fully Homomorphic Encryption
    • 302
    • PDF
    Implementing Gentry's Fully-Homomorphic Encryption Scheme
    • 834
    • PDF