Homomorphic Encryption in the Cloud

被引:0
|
作者
Hrestak, Darko [1 ]
Picek, Stjepan [1 ]
机构
[1] Univ Zagreb, Fac Elect Engn & Comp, Zagreb 41000, Croatia
关键词
PUBLIC-KEY CRYPTOSYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Since the first notions of fully homomorphic encryption more than 30 years ago, there has been numerous attempts to develop such a system. Finally, in 2009 Craig Gentry succeeded. Homomorphic encryption brings great advantages but it seems that, at least for now, it also brings many practical difficulties. Furthermore, in the last couple of years, several other fully homomorphic systems arose where each has its one advantages and drawbacks. However, with the developments in cloud computing, we need it more than ever to become practical for real-world usages. In this paper we are discussing the strengths and weaknesses of homomorphic encryption and we give a brief description of several promising fully homomorphic encryption systems. Next, we give a special attention to the homomorphic encryption systems for cloud computing. Finally, we discuss some recent developments by IBM and their open-source library for homomorphic encryption.
引用
收藏
页码:1400 / 1404
页数:5
相关论文
共 50 条
  • [41] Securing the Cloud with Reconfigurable Computing: An FPGA Accelerator for Homomorphic Encryption
    Cilardo, Alessandro
    Argenziano, Domenico
    [J]. PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1622 - 1627
  • [42] Ciphertext Retrieval Technology of Homomorphic Encryption Based on Cloud Pretreatment
    Gong, Changqing
    Xiao, Yun
    Li, Mengfei
    Han, Shoufei
    Lin, Na
    Guo, Zhenzhou
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 741 - 751
  • [43] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [44] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    [J]. TECHNOLOGIES, 2019, 7 (01):
  • [45] Research perspectives on fully homomorphic encryption models for cloud sector
    Mittal, Sonam
    Ramkumar, K. R.
    [J]. JOURNAL OF COMPUTER SECURITY, 2021, 29 (02) : 135 - 160
  • [46] A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 618 - 625
  • [47] Practical homomorphic encryption over the integers for secure computation in the cloud
    Dyer, James
    Dyer, Martin
    Xu, Jie
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 549 - 579
  • [48] Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
    Mohammed, Mohammed A.
    Abed, Fadhil S.
    [J]. ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2020, 8 (02): : 40 - 47
  • [49] Secure Computation over Cloud using Fully Homomorphic Encryption
    Bilakanti, Anusha
    Anjana, N. B.
    Divya, A.
    Divya, K.
    Chakraborty, Nilotpal
    Patra, G. K.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 633 - 636
  • [50] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488