Survey of Various Homomorphic Encryption algorithms and Schemes

  title={Survey of Various Homomorphic Encryption algorithms and Schemes},
  author={P. Parmar and Shraddha B. Padhar and Shafika N. Patel and Niyatee I. Bhatt and R. Jhaveri},
  journal={International Journal of Computer Applications},
  • P. Parmar, Shraddha B. Padhar, +2 authors R. Jhaveri
  • Published 2014
  • Computer Science
  • International Journal of Computer Applications
  • Homomorphic encryption is the encryption scheme which means the operations on the encrypted data. Homomorphic encryption can be applied in any system by using various public key algorithms. When the data is transferred to the public area, there are many encryption algorithms to secure the operations and the storage of the data. But to process data located on remote server and to preserve privacy, homomorphic encryption is useful that allows the operations on the cipher text, which can provide… CONTINUE READING
    70 Citations

    Figures, Tables, and Topics from this paper

    New Fully Homomorphic Encryption Scheme Based on Multistage Partial Homomorphic Encryption Applied in Cloud Computing
    • Z. Mahmood, M. K. Ibrahem
    • Computer Science
    • 2018 1st Annual International Conference on Information and Sciences (AiCIS)
    • 2018
    • 7
    Analysis and Comparison of Various Fully Homomorphic Encryption Techniques
    • 3
    Survey on Homomorphic Encryption and Address of New Trend
    • 1
    • PDF
    A Survey on Homomorphic Encryption Schemes
    • 124
    • PDF
    A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    • 74
    • PDF
    Homomorphic cloud computing scheme based on hybrid homomorphic encryption
    • Xidan Song, Y. Wang
    • Computer Science
    • 2017 3rd IEEE International Conference on Computer and Communications (ICCC)
    • 2017
    • 10
    Big Data Privacy Using Fully Homomorphic Non-Deterministic Encryption
    • 4
    FHE Implementation of Data in Cloud Computing
    A Comparative Study on Homomorphic Encryption Schemes in Cloud Computing
    • A. Kavya, Shreenath Acharva
    • Computer Science
    • 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
    • 2018


    A algorithm of fully homomorphic encryption
    • Guangli Xiang, B. Yu, P. Zhu
    • Mathematics, Computer Science
    • 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery
    • 2012
    • 17
    Non-interactive Exponential Homomorphic Encryption Algorithm
    • L. Chen, T. Zhang, W. Liu, C. Gao
    • Computer Science
    • 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
    • 2012
    • 4
    Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}
    • 5
    • PDF
    Homomorphic Encryption Scheme of the Rational
    • P. Zhu, Y. He, Guangli Xiang
    • Mathematics
    • 2006 International Conference on Wireless Communications, Networking and Mobile Computing
    • 2006
    • 7
    Homomorphic Encryption Applied to the Cloud Computing Security
    • 138
    • PDF
    Simulation Study Based on Somewhat Homomorphic Encryption
    • 10
    • PDF
    The use of encrypted functions for mobile agent security
    • 103
    • PDF