Survey of Various Homomorphic Encryption algorithms and Schemes

@article{Parmar2014SurveyOV,
  title={Survey of Various Homomorphic Encryption algorithms and Schemes},
  author={Payal Parmar and Shraddha B. Padhar and Shafika N. Patel and Niyatee I. Bhatt and Rutvij H. Jhaveri},
  journal={International Journal of Computer Applications},
  year={2014},
  volume={91},
  pages={26-32}
}
Homomorphic encryption is the encryption scheme which means the operations on the encrypted data. Homomorphic encryption can be applied in any system by using various public key algorithms. When the data is transferred to the public area, there are many encryption algorithms to secure the operations and the storage of the data. But to process data located on remote server and to preserve privacy, homomorphic encryption is useful that allows the operations on the cipher text, which can provide… 

Figures and Tables from this paper

New Fully Homomorphic Encryption Scheme Based on Multistage Partial Homomorphic Encryption Applied in Cloud Computing
TLDR
The paper builds up a hybrid homomorphic encryption scheme based on the GM encryption algorithm which is additively (single bit) homomorphic, and RSAgorithm which is multiplicative homomorphic which lead to increase the speed, reduce the computation time, and enhance confidentiality of the data that is stored in the cloud by enhancing security.
Analysis and Comparison of Various Fully Homomorphic Encryption Techniques
TLDR
This paper provides the essentials of Homomorphic encryption and its various classifications and an investigation of different full homomorphic encryption schemes that uses the hardness of Ideal-lattice, integers, learning with error, elliptic curve cryptography based.
Survey on Homomorphic Encryption and Address of New Trend
TLDR
This article aims to introduce a literature survey to close the gap in homomorphic encryption systems and their applications in the protection of privacy and presents recommendations for future work.
A Survey on Homomorphic Encryption Schemes
TLDR
The basics of HE and the details of the well-known Partially Homomorphic Encryption and Somewhat Homomorphic encryption schemes, which are important pillars for achieving FHE, are presented and the implementations and recent improvements in Gentry-type FHE schemes are surveyed.
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
TLDR
The basics of HE and the details of the well-known Partially Homomorphic Encryption and Somewhat HomomorphicEncryption, which are important pillars of achieving FHE, are presented and the main FHE families, which have become the base for the other follow-up FHE schemes are presented.
Homomorphic cloud computing scheme based on hybrid homomorphic encryption
  • Xidan SongYulin Wang
  • Computer Science
    2017 3rd IEEE International Conference on Computer and Communications (ICCC)
  • 2017
TLDR
A hybrid cloud computing scheme based on the Paillier algorithm, and RSA encryption algorithm which is multiplicative homomorphic is developed, and the results show that the scheme is practical and efficient.
Big Data Privacy Using Fully Homomorphic Non-Deterministic Encryption
TLDR
The proposed encryption algorithm computes more than one mathematical operation on encrypted numerical data thereby further protecting the encrypted sensitive information.
Computing on Encrypted Data into the Cloud Though Fully Homomorphic Encryption
TLDR
This work proposes a platform based on open source solutions to perform data computations (addition and multiplication) on encrypted form and studies the most popular partially homomorphic encryption algorithms to compromise between performance and security.
FHE Implementation of Data in Cloud Computing
  • M. Miyan
  • Computer Science, Mathematics
  • 2017
TLDR
The homomorphic encryption plays a significant role in cloud computing because the encrypted information of corporations is keep in a very public cloud, therefore taking advantage of the cloud provider’s services.
A Comparative Study on Homomorphic Encryption Schemes in Cloud Computing
  • A. KavyaShreenath Acharva
  • Computer Science, Mathematics
    2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
  • 2018
TLDR
A security system using fully homomorphic encryption to secure medical data in the cloud is proposed, which will try to ensure security to the data even while processing it with better performance.
...
...

References

SHOWING 1-10 OF 44 REFERENCES
A algorithm of fully homomorphic encryption
  • Guangli XiangB. YuPing Zhu
  • Computer Science, Mathematics
    2012 9th International Conference on Fuzzy Systems and Knowledge Discovery
  • 2012
TLDR
In the paper, the interrelated technique is discribed and a modified ElGamal Encryption is introduced that can meet multiplicative homomorphism and additive homomorphicism and advance security.
Non-interactive Exponential Homomorphic Encryption Algorithm
  • Liang ChenT. ZhangWen LiuC. Gao
  • Mathematics, Computer Science
    2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
  • 2012
TLDR
The concept of exponential homomorphism is presented and an exponential homomorphic encryption algorithm based on RSA is proposed that can encrypt coefficients and exponents of polynomial functions, hide the skeleton of the encrypted polyn coefficients, and implement non-interactive evaluation of encrypted exponential functions and polynometric functions.
ON DATA BANKS AND PRIVACY HOMOMORPHISMS
TLDR
It appears likely that there exist encryption functions which permit encrypted data to be operated on without preliminary decryption of the operands, for many sets of interesting operations.
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}
TLDR
This paper presents an alternative construction allowing to compute products with polynomiallymany operands while preserving the security reductions of the initial scheme, and indicates that this construction seems to be incompatible with Gentry’s seminal transformation allowing to obtain fully-homomorphic encryption schemes.
Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs)
TLDR
It is shown how aggregation function minimum/maximum can be computed at the aggregator node in WSNs by performing addition operation and not comparison operation on the data encrypted with homomorphic encryption schemes.
Homomorphic Encryption Scheme of the Rational
TLDR
A new operation is defined - similar modul, the number sets of the homomorphic encryption scheme is extended to rational, and the possible operators are extended to addition, subtraction, multiplication and division.
An Efficient Secure Message Transmission in Mobile Ad Hoc Networks using Enhanced Homomorphic Encryption Scheme
TLDR
A new scheme for secure transmission of message in MANETs is proposed as Alternative scheme for DF’s new Ph and DF”s additive and multiplicative PH and the computational cost of the homomorphic encryption schemes is provided.
Simulation Study Based on Somewhat Homomorphic Encryption
TLDR
This paper presents the relationship between the length of plaintext and ciphertext size and the Gentry’s Somewhat Homomorphic Encryption scheme for the simulation research, in clear text size within a certain range simulation.
On the Security of a Modified Paillier Public-Key Primitive
TLDR
It is proved that the one-wayness of the M-Paillier cryptosystem is as intractable as factoring the modulus n, if the public key g can be generated only by the public modulus g and that the oracle that can generate the public-key factors themodulus n.
Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
TLDR
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications and Efficient and Provably Secure Multi-receiver Identity-Based Signcryption are discussed.
...
...