A retrospective analysis on fully homomorphic encryption scheme

被引:0
|
作者
Mittal, Sonam [1 ]
Ramkumar, K. R. [1 ]
机构
[1] Chitkara Univ, Inst Engn & Technol, Punjab, India
关键词
fully homomorphic encryption; Gentry; DGHV; learning with errors; LWE; ring learning with errors; RLWE; Nth degree truncated polynomial ring units; NTRU; RING-LWE; MULTI-IDENTITY; KEY; INTEGERS; LATTICE; CRYPTOSYSTEM; COMPUTATION; DESIGN; SPARSE; RLWE;
D O I
10.1504/IJESDF.2024.137031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers of cybersecurity have started a hunt for refining the data encryption models for real-life applications. The security and confidentiality of data over cloud as a third party is a big issue, to the users. To overcome this problem, the cloud uses some encryption methods for data security. The FHE, an unconventional technology provides unrivalled capabilities to perform computation on encrypted text to facilitate the secure computation for big-data analysis. The paper presents a review of existing standards of FHE schemes such as lattice-based, integer-based, LWE, RLWE, and NTRU. Various challenges need to be addressed are listed, to model the more competent, effective, and dynamic FHE model. The concepts that underpin these schemes are discussed, as are their performance and security concerns. The paper helps to understand the different hurdles that need to be overcome for real-life applications and helps to find the direction for their research for a better FHE scheme.
引用
收藏
页码:223 / 254
页数:33
相关论文
共 50 条
  • [1] An efficient fully homomorphic encryption scheme
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Cherif
    International Journal of Network Security, 2019, 21 (01) : 91 - 99
  • [2] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [3] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [4] The Implemention and Application of Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Yang, Ming
    Wang, Cai-Ling
    Xu, Shan-Shan
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
  • [5] A novel method of fully homomorphic encryption scheme
    Mittal, Sonam
    Suntheya, A.K.
    Anbunathan, R.
    Ashokkumar, N.
    International Journal of Computing Science and Mathematics, 2024, 20 (03) : 228 - 242
  • [6] Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
    Wang, Baocang
    Zhan, Yu
    Zhang, Zhili
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1460 - 1467
  • [7] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [8] A Novel Fully Homomorphic Encryption Scheme Bsed on LWE
    DING Yong
    LI Xiumin
    Lü Haifeng
    LI Xinguo
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 84 - 92
  • [9] Fully Homomorphic Encryption Scheme Based on Decomposition Ring
    Arita, Seiko
    Handa, Sari
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 195 - 211
  • [10] Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme
    Qu, Quanbo
    Wang, Baocang
    Ping, Yuan
    Zhang, Zhili
    SECURITY AND COMMUNICATION NETWORKS, 2019,