A retrospective analysis on fully homomorphic encryption scheme

被引:0
|
作者
Mittal, Sonam [1 ]
Ramkumar, K. R. [1 ]
机构
[1] Chitkara Univ, Inst Engn & Technol, Punjab, India
关键词
fully homomorphic encryption; Gentry; DGHV; learning with errors; LWE; ring learning with errors; RLWE; Nth degree truncated polynomial ring units; NTRU; RING-LWE; MULTI-IDENTITY; KEY; INTEGERS; LATTICE; CRYPTOSYSTEM; COMPUTATION; DESIGN; SPARSE; RLWE;
D O I
10.1504/IJESDF.2024.137031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers of cybersecurity have started a hunt for refining the data encryption models for real-life applications. The security and confidentiality of data over cloud as a third party is a big issue, to the users. To overcome this problem, the cloud uses some encryption methods for data security. The FHE, an unconventional technology provides unrivalled capabilities to perform computation on encrypted text to facilitate the secure computation for big-data analysis. The paper presents a review of existing standards of FHE schemes such as lattice-based, integer-based, LWE, RLWE, and NTRU. Various challenges need to be addressed are listed, to model the more competent, effective, and dynamic FHE model. The concepts that underpin these schemes are discussed, as are their performance and security concerns. The paper helps to understand the different hurdles that need to be overcome for real-life applications and helps to find the direction for their research for a better FHE scheme.
引用
收藏
页码:223 / 254
页数:33
相关论文
共 50 条
  • [31] An Effective NTRU-Based Fully Homomorphic Encryption Scheme
    Qin, Xiaoyue
    Huang, Ruwei
    Fan, Huifeng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [32] Secure Multiparty Computation via Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Wang, Zhao-Li
    Shi, Ya-Qing
    Wang, Mei-Juan
    Dong, Hui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 250 - 253
  • [33] A multi-valued quantum fully homomorphic encryption scheme
    Yuanjing Zhang
    Tao Shang
    Jianwei Liu
    Quantum Information Processing, 2021, 20
  • [34] An Improved Fully Homomorphic Encryption Scheme under the Cloud Environment
    Wu, Zuowei
    Li, Taoshen
    12TH CHINESE CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CHINESECSCW 2017), 2017, : 251 - 252
  • [35] Fully homomorphic encryption scheme and Fermat's little theorem
    Chun, Samgu
    Choi, Wonseok
    Hyun, Jin Woo
    Kang, Seok-Jin
    Kim, Hyoung Joong
    Kim, Young Rock
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2024, 23 (04)
  • [36] An Improved Ciphertext Retrieval Scheme Based on Fully Homomorphic Encryption
    LI Xinyan
    MOU Huajian
    LU Dianjun
    Wuhan University Journal of Natural Sciences, 2019, 24 (03) : 218 - 222
  • [37] AN ACCELE TED FULLY HOMOMORPHIC ENCRYPTION SCHEME OVER THE INTEGERS
    Zhang, Peng
    Sun, Xiaoqiang
    Wang, Ting
    Gu, Sizhu
    Yu, Jianping
    Xie, Weixin
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 419 - 423
  • [38] Analysis of One Fully Homomorphic Encryption Scheme in Client-Server Computing Scenario
    Li, Yang
    Liu, Lihua
    International Journal of Network Security, 2020, 22 (06) : 1032 - 1036
  • [39] Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption
    Lee, Kang Hoon
    Jeon, YoungBae
    Yoon, Ji Won
    9TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P 2024, 2024, : 486 - 505
  • [40] Optimizations in Fully Homomorphic Encryption
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-cherif
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 150 - 166