Fully Homomorphic Encryption Schemes: the State of The Art

被引:0
|
作者
Kogos, Konstantin G. [1 ]
Filippova, Kseniia S. [1 ]
Epishkina, Anna V. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Cryptol & Cybersecur, Moscow, Russia
关键词
encryption; fully homomorphic encryption; bootstrapping; public key encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The challenge of maintaining confidentiality of stored and processed data in a remote database or cloud is quite urgent. Using homomorphic encryption may solve the problem, because it allows to compute some functions over encrypted data without preliminary deciphering of data. Fully homomorphic encryption schemes have a number of limitations such as accumulation of noise and increase of ciphertext extension during performing operations, the range of operations is limited. Nowadays a lot of homomorphic encryption schemes and their modifications have been investigated, so more than 25 reports on homomorphic encryption schemes have already been published on Cryptology ePrint Archive for 2016. We propose an overview of current Fully Homomorphic Encryption Schemes and analyze specific operations for databases which homomorphic cryptosystems allow to perform. We also investigate the possibility of sorting over encrypted data and present our approach to compare data encrypted by Multi-bit FHE scheme.
引用
收藏
页码:463 / 466
页数:4
相关论文
共 50 条
  • [1] On DGHV and BGV Fully Homomorphic Encryption Schemes
    Hariss, Khalil
    Chamoun, Maroun
    Samhat, Abed Ellatif
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [2] Acceleration techniques for fully-homomorphic encryption schemes
    Lupascu, Cristian
    Togan, Mihai
    Patriciu, Victor-Valeriu
    2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 118 - 122
  • [3] Homomorphic Encryption-State of the Art
    Mohan, Maya
    Devi, M. K. Kavitha
    Prakash, Jeevan, V
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [4] Evaluation of the Complexity of Fully Homomorphic Encryption Schemes in Implementations of Programs
    Chakarov, Dimitar
    Papazov, Yavor
    COMPUTER SYSTEMS AND TECHNOLOGIES, 2019, : 62 - 67
  • [5] Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors
    Li, Mingxiang
    IEEE ACCESS, 2020, 8 : 26749 - 26763
  • [6] Towards practical program execution over fully homomorphic encryption schemes
    Fau, Simon
    Sirdey, Renaud
    Fontaine, Caroline
    Aguilar-Melchor, Carlos
    Gogniat, Guy
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 284 - 290
  • [7] Parallelizing Fully Homomorphic Encryption
    Hayward, Ryan
    Chiang, Chia-Chu
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 721 - 724
  • [8] Optimizations in Fully Homomorphic Encryption
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-cherif
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 150 - 166
  • [9] A Flexible Fully Homomorphic Encryption
    Chunguang Ma
    Juyan Li
    Gang Du
    Wireless Personal Communications, 2017, 95 : 761 - 772
  • [10] A Flexible Fully Homomorphic Encryption
    Ma, Chunguang
    Li, Juyan
    Du, Gang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 761 - 772