Fully Homomorphic Encryption Schemes: the State of The Art

被引:0
|
作者
Kogos, Konstantin G. [1 ]
Filippova, Kseniia S. [1 ]
Epishkina, Anna V. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Cryptol & Cybersecur, Moscow, Russia
关键词
encryption; fully homomorphic encryption; bootstrapping; public key encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The challenge of maintaining confidentiality of stored and processed data in a remote database or cloud is quite urgent. Using homomorphic encryption may solve the problem, because it allows to compute some functions over encrypted data without preliminary deciphering of data. Fully homomorphic encryption schemes have a number of limitations such as accumulation of noise and increase of ciphertext extension during performing operations, the range of operations is limited. Nowadays a lot of homomorphic encryption schemes and their modifications have been investigated, so more than 25 reports on homomorphic encryption schemes have already been published on Cryptology ePrint Archive for 2016. We propose an overview of current Fully Homomorphic Encryption Schemes and analyze specific operations for databases which homomorphic cryptosystems allow to perform. We also investigate the possibility of sorting over encrypted data and present our approach to compare data encrypted by Multi-bit FHE scheme.
引用
收藏
页码:463 / 466
页数:4
相关论文
共 50 条
  • [41] Fully homomorphic encryption and its applications
    Beijing International Center for Mathematical Research, Peking University, Beijing
    100871, China
    不详
    100084, China
    Jisuanji Yanjiu yu Fazhan, 12 (2593-2603):
  • [42] Fully homomorphic encryption: A case study
    Rauthan, J. S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (06) : 8417 - 8437
  • [43] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [44] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [45] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [46] Implementing the Grover algorithm in homomorphic encryption schemes
    Fernandez, Pablo
    Martin-Delgado, Miguel A.
    PHYSICAL REVIEW RESEARCH, 2024, 6 (04):
  • [47] Candidate iO from Homomorphic Encryption Schemes
    Brakerski, Zvika
    Doettling, Nico
    Garg, Sanjam
    Malavolta, Giulio
    JOURNAL OF CRYPTOLOGY, 2023, 36 (03)
  • [48] A Comparison of the Homomorphic Encryption Schemes FV and YASHE
    Lepoint, Tancrede
    Naehrig, Michael
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 318 - 335
  • [49] A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    Acar, Abbas
    Aksu, Hidayet
    Uluagac, A. Selcuk
    Conti, Mauro
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [50] Candidate iO from Homomorphic Encryption Schemes
    Brakerski, Zvika
    Doettling, Nico
    Garg, Sanjam
    Malavolta, Giulio
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 79 - 109