The Implemention and Application of Fully Homomorphic Encryption Scheme

被引:2
|
作者
Han, Jing-Li [1 ]
Yang, Ming [1 ]
Wang, Cai-Ling [1 ]
Xu, Shan-Shan [1 ]
机构
[1] PLA Univ Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Fully Homomorphic Encrypted Scheme; application; Attribute based Encryption; secrching on encrypted data; delegate computing;
D O I
10.1109/IMCCC.2012.173
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fully homomorphic encryption scheme (FHE) has numerous applications, especially in the cloud computation. Recently, FHE has been the focus of extensive study, but mostly were researching into the construction and efficiency of the scheme, a fat lot focus on the application of the scheme. In this paper, we present a new system for searching on encrypted data which combined ABE (Attribute based Encryption) and FHE. Our system enables anyone even without private-key of the encrypted data to search the data. In the end, we discuss the application of FHE on outsourcing of computation and present two different systems matched the different requirement.
引用
收藏
页码:714 / 717
页数:4
相关论文
共 50 条
  • [21] New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing
    Mahmood, Zainab Hikmat
    Ibrahem, Mahmood Khalel
    2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 182 - 186
  • [22] Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Xie, Run
    Zhao, Jining
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 180 - 186
  • [23] A multi-valued quantum fully homomorphic encryption scheme
    Zhang, Yuanjing
    Shang, Tao
    Liu, Jianwei
    QUANTUM INFORMATION PROCESSING, 2021, 20 (03)
  • [24] Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
    Mohammed, Mohammed A.
    Abed, Fadhil S.
    ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2020, 8 (02): : 40 - 47
  • [25] Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
    Kuang, Liwei
    Yang, Laurence T.
    Feng, Jun
    Dong, Mianxiong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (03) : 868 - 878
  • [26] Multiple to One Fully Homomorphic Encryption Scheme over the Integers
    Wang Caifen
    Cheng Yudan
    Liu Chao
    Zhao Bing
    Xu Qinbai
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (09) : 2119 - 2126
  • [27] A Fully Homomorphic Encryption Scheme over Finite Prime Field
    Bai, Liwang
    Zhao, Qiqi
    Lan, Yuqing
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 610 - 618
  • [28] Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
    Tsaban, Boaz
    Lifshitz, Noam
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 75 - 78
  • [29] An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers
    Sun, Xiaoqiang
    Zhang, Peng
    Yu, Jianping
    Xie, Weixin
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 835 - 846
  • [30] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):