Performance Evaluation of Fully Homomorphic Encryption for End-to-End Cryptographic Communication in Multihop Networks

被引:0
|
作者
Shim, Hye-Yeon [1 ]
Park, Tae-Rim [1 ]
Lee, Il-Gu [1 ]
机构
[1] Sungshin Univ, Dept Future Convergence Technol Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Homomorphic encryption; network; communication; Advanced Encryption Standard; fully homomorphic encryption;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the advent of a hyperconnected society, network services that connect the cloud and user terminals are emerging. Accordingly, the security technology that guarantees security and speed in end-to-end communication is becoming more important. Homomorphic encryption is useful in environments that require security in the end-to-end communication that can be operated without decryption. However, it is difficult to apply in an actual communication environment because the speed is slower than other encryption methods. In this study, we used fully homomorphic encryption and advanced encryption standards. And we built an end-to-end encryption communication network simulation environment that transmits data. Based on this, this study compares the transmission time according to the transmission environment. According to the experimental results of this study, a more effective encryption method can be selected and transmitted according to the length of the transmitted message, number of intermediate nodes, and encryption setting.
引用
收藏
页码:431 / 434
页数:4
相关论文
共 50 条
  • [1] MemFHE: End-to-end Computing with Fully Homomorphic Encryption in Memory
    Gupta, Saransh
    Cammarota, Rosario
    Simunic, Tajana
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)
  • [2] PyTFHE: An End-to-End Compilation and Execution Framework for Fully Homomorphic Encryption Applications
    Ma, Jiaao
    Xu, Ceyu
    Wills, Lisa Wu
    [J]. 2023 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE, ISPASS, 2023, : 24 - 34
  • [3] Homomorphic Encryption as End-to-End Solution for Smart Devices
    Shanthala, P. T.
    Annapurna, D.
    Nittala, Sravanthi
    Bhat, Arpitha S.
    Aishwarya
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 57 - 62
  • [4] Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption
    Rohloff, Kurt
    Cousins, David Bruce
    Sumorok, Daniel
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1031 - 1041
  • [5] End-to-end Throughput Evaluation of Consensus TPC Algorithm in Multihop Wireless Networks
    Yu, Yu
    Shah, Shashi
    Tan, Yasuo
    Lim, Yuto
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 941 - 946
  • [6] Upperbounding end-to-end throughput of multihop wireless networks
    Lu, Hong
    Liu, Steve
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 676 - 687
  • [7] Minimizing End-to-End Delays in Linear Multihop Networks
    Hu, Dali
    Wu, Jingxian
    Fan, Pingzhi
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) : 6487 - 6496
  • [8] Performance Evaluation of End-to-End Communication Quality of LTE
    Zhang, Liang
    Okamawari, Takao
    Fujii, Teruya
    [J]. 2012 IEEE 75TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2012,
  • [9] Design of Cryptographic model for End-to-End Encryption in FPGA based systems
    Chatterjee, Runa
    Chakraborty, Rajdeep
    Mandal, J. K.
    [J]. PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 459 - 465
  • [10] Adaptive Contention Control for Improving End-to-End Throughput Performance of Multihop Wireless Networks
    Jung, Daewon
    Hwang, Jaeseon
    Lim, Hyuk
    Park, Kyung-Joon
    Hou, Jennifer C.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (02) : 696 - 705