A retrospective analysis on fully homomorphic encryption scheme

被引:0
|
作者
Mittal, Sonam [1 ]
Ramkumar, K. R. [1 ]
机构
[1] Chitkara Univ, Inst Engn & Technol, Punjab, India
关键词
fully homomorphic encryption; Gentry; DGHV; learning with errors; LWE; ring learning with errors; RLWE; Nth degree truncated polynomial ring units; NTRU; RING-LWE; MULTI-IDENTITY; KEY; INTEGERS; LATTICE; CRYPTOSYSTEM; COMPUTATION; DESIGN; SPARSE; RLWE;
D O I
10.1504/IJESDF.2024.137031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers of cybersecurity have started a hunt for refining the data encryption models for real-life applications. The security and confidentiality of data over cloud as a third party is a big issue, to the users. To overcome this problem, the cloud uses some encryption methods for data security. The FHE, an unconventional technology provides unrivalled capabilities to perform computation on encrypted text to facilitate the secure computation for big-data analysis. The paper presents a review of existing standards of FHE schemes such as lattice-based, integer-based, LWE, RLWE, and NTRU. Various challenges need to be addressed are listed, to model the more competent, effective, and dynamic FHE model. The concepts that underpin these schemes are discussed, as are their performance and security concerns. The paper helps to understand the different hurdles that need to be overcome for real-life applications and helps to find the direction for their research for a better FHE scheme.
引用
收藏
页码:223 / 254
页数:33
相关论文
共 50 条
  • [21] A multi-valued quantum fully homomorphic encryption scheme
    Zhang, Yuanjing
    Shang, Tao
    Liu, Jianwei
    QUANTUM INFORMATION PROCESSING, 2021, 20 (03)
  • [22] Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
    Mohammed, Mohammed A.
    Abed, Fadhil S.
    ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2020, 8 (02): : 40 - 47
  • [23] Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
    Kuang, Liwei
    Yang, Laurence T.
    Feng, Jun
    Dong, Mianxiong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (03) : 868 - 878
  • [24] Multiple to One Fully Homomorphic Encryption Scheme over the Integers
    Wang Caifen
    Cheng Yudan
    Liu Chao
    Zhao Bing
    Xu Qinbai
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (09) : 2119 - 2126
  • [25] A Fully Homomorphic Encryption Scheme over Finite Prime Field
    Bai, Liwang
    Zhao, Qiqi
    Lan, Yuqing
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 610 - 618
  • [26] Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
    Tsaban, Boaz
    Lifshitz, Noam
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 75 - 78
  • [27] An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers
    Sun, Xiaoqiang
    Zhang, Peng
    Yu, Jianping
    Xie, Weixin
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 835 - 846
  • [28] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):
  • [29] Implementing Gentry's Fully-Homomorphic Encryption Scheme
    Gentry, Craig
    Halevi, Shai
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 129 - 148
  • [30] A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CLOUD COMPUTING
    Li, Jian
    Song, Danjie
    Chen, Sicong
    Lu, Xiaofeng
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 214 - 217