The Implemention and Application of Fully Homomorphic Encryption Scheme

被引:2
|
作者
Han, Jing-Li [1 ]
Yang, Ming [1 ]
Wang, Cai-Ling [1 ]
Xu, Shan-Shan [1 ]
机构
[1] PLA Univ Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Fully Homomorphic Encrypted Scheme; application; Attribute based Encryption; secrching on encrypted data; delegate computing;
D O I
10.1109/IMCCC.2012.173
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fully homomorphic encryption scheme (FHE) has numerous applications, especially in the cloud computation. Recently, FHE has been the focus of extensive study, but mostly were researching into the construction and efficiency of the scheme, a fat lot focus on the application of the scheme. In this paper, we present a new system for searching on encrypted data which combined ABE (Attribute based Encryption) and FHE. Our system enables anyone even without private-key of the encrypted data to search the data. In the end, we discuss the application of FHE on outsourcing of computation and present two different systems matched the different requirement.
引用
收藏
页码:714 / 717
页数:4
相关论文
共 50 条
  • [1] An efficient fully homomorphic encryption scheme
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Cherif
    International Journal of Network Security, 2019, 21 (01) : 91 - 99
  • [2] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [3] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [4] A novel method of fully homomorphic encryption scheme
    Mittal, Sonam
    Suntheya, A.K.
    Anbunathan, R.
    Ashokkumar, N.
    International Journal of Computing Science and Mathematics, 2024, 20 (03) : 228 - 242
  • [5] Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
    Wang, Baocang
    Zhan, Yu
    Zhang, Zhili
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1460 - 1467
  • [6] A retrospective analysis on fully homomorphic encryption scheme
    Mittal, Sonam
    Ramkumar, K. R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 223 - 254
  • [7] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [8] A Novel Fully Homomorphic Encryption Scheme Bsed on LWE
    DING Yong
    LI Xiumin
    Lü Haifeng
    LI Xinguo
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 84 - 92
  • [9] Fully Homomorphic Encryption Scheme Based on Decomposition Ring
    Arita, Seiko
    Handa, Sari
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 195 - 211
  • [10] Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme
    Qu, Quanbo
    Wang, Baocang
    Ping, Yuan
    Zhang, Zhili
    SECURITY AND COMMUNICATION NETWORKS, 2019,