Fully Homomorphic Encryption Schemes: the State of The Art

被引:0
|
作者
Kogos, Konstantin G. [1 ]
Filippova, Kseniia S. [1 ]
Epishkina, Anna V. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Cryptol & Cybersecur, Moscow, Russia
关键词
encryption; fully homomorphic encryption; bootstrapping; public key encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The challenge of maintaining confidentiality of stored and processed data in a remote database or cloud is quite urgent. Using homomorphic encryption may solve the problem, because it allows to compute some functions over encrypted data without preliminary deciphering of data. Fully homomorphic encryption schemes have a number of limitations such as accumulation of noise and increase of ciphertext extension during performing operations, the range of operations is limited. Nowadays a lot of homomorphic encryption schemes and their modifications have been investigated, so more than 25 reports on homomorphic encryption schemes have already been published on Cryptology ePrint Archive for 2016. We propose an overview of current Fully Homomorphic Encryption Schemes and analyze specific operations for databases which homomorphic cryptosystems allow to perform. We also investigate the possibility of sorting over encrypted data and present our approach to compare data encrypted by Multi-bit FHE scheme.
引用
收藏
页码:463 / 466
页数:4
相关论文
共 50 条
  • [31] HECO: Fully Homomorphic Encryption Compiler
    Viand, Alexander
    Jattke, Patrick
    Haller, Miro
    Hithnawi, Anwar
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4715 - 4732
  • [32] Fully Homomorphic Encryption with Auxiliary Inputs
    Wang, Fuqun
    Wang, Kunpeng
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 220 - 238
  • [33] Better Bootstrapping in Fully Homomorphic Encryption
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 1 - 16
  • [34] Research Progress of Fully Homomorphic Encryption
    Lifang, Bai
    Yuefei, Zhu
    Yongjun, Li
    Shuai, Wang
    Xiaoqi, Yang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3069 - 3087
  • [35] MULTIKEY FULLY HOMOMORPHIC ENCRYPTION AND APPLICATIONS
    Lopez-Alt, Adriana
    Tromer, Eran
    Vaikuntanathan, Vinod
    SIAM JOURNAL ON COMPUTING, 2017, 46 (06) : 1827 - 1892
  • [36] Leakage Resilient Fully Homomorphic Encryption
    Berkoff, Alexandra
    Liu, Feng-Hao
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 515 - 539
  • [37] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [38] Fully Homomorphic Encryption with Polylog Overhead
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 465 - 482
  • [39] Verifiable Decryption for Fully Homomorphic Encryption
    Luo, Fucai
    Wang, Kunpeng
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 347 - 365
  • [40] Fully Homomorphic Encryption: Computations with a Blindfold
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    IEEE SECURITY & PRIVACY, 2016, 14 (01) : 62 - 66