Homomorphic Encryption in the Cloud

被引:0
|
作者
Hrestak, Darko [1 ]
Picek, Stjepan [1 ]
机构
[1] Univ Zagreb, Fac Elect Engn & Comp, Zagreb 41000, Croatia
关键词
PUBLIC-KEY CRYPTOSYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Since the first notions of fully homomorphic encryption more than 30 years ago, there has been numerous attempts to develop such a system. Finally, in 2009 Craig Gentry succeeded. Homomorphic encryption brings great advantages but it seems that, at least for now, it also brings many practical difficulties. Furthermore, in the last couple of years, several other fully homomorphic systems arose where each has its one advantages and drawbacks. However, with the developments in cloud computing, we need it more than ever to become practical for real-world usages. In this paper we are discussing the strengths and weaknesses of homomorphic encryption and we give a brief description of several promising fully homomorphic encryption systems. Next, we give a special attention to the homomorphic encryption systems for cloud computing. Finally, we discuss some recent developments by IBM and their open-source library for homomorphic encryption.
引用
收藏
页码:1400 / 1404
页数:5
相关论文
共 50 条
  • [1] Homomorphic Encryption for Cluster in Cloud
    Vamshinath, N.
    Ramya, K. Ruth
    Krishna, Sai
    Bhaskar, P. Gopi
    Mwaseba, Geofrey L.
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 319 - 324
  • [2] Homomorphic Encryption Technology for Cloud Computing
    Zhao, Min E.
    Geng, Yang
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019], 2019, 154 : 73 - 83
  • [3] Hybrid Homomorphic Encryption for Cloud Privacy
    Bensitel, Yasmina
    Rahal, Romadi
    [J]. Networked Systems, NETYS 2016, 2016, 9944 : 380 - 380
  • [4] Dual Homomorphic Encryption for Cloud Computing
    Wang, Huai-Xi
    Shu, Ni-Na
    Li, Yong-Xiang
    Wang, Chen
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 838 - 842
  • [5] Cloud Security based on the Homomorphic Encryption
    Al-Sit, Waleed T.
    Al-Zoubi, Hani
    Al-Jubouri, Qussay
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 300 - 307
  • [6] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [7] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453
  • [8] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    [J]. PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [9] Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
    Khan, Saif Ali
    Aggarwal, R. K.
    Kulkarni, Shashidhar
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 395 - 400
  • [10] Homomorphic Encryption versus Searchable Encryption for Data Retrieval on Cloud
    Bulbul, Busranur
    Bahtiyar, Serif
    Altilar, Deniz Turgay
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 187 - 192