Homomorphic Encryption: Theory & Applications

Jaydip Sen
DOI: https://doi.org/10.5772/56687
2013-05-25
Abstract:The goal of this chapter is to present a survey of homomorphic encryption techniques and their applications. After a detailed discussion on the introduction and motivation of the chapter, we present some basic concepts of cryptography. The fundamental theories of homomorphic encryption are then discussed with suitable examples. The chapter then provides a survey of some of the classical homomorphic encryption schemes existing in the current literature. Various applications and salient properties of homomorphic encryption schemes are then discussed in detail. The chapter then introduces the most important and recent research direction in the filed - fully homomorphic encryption. A significant number of propositions on fully homomorphic encryption is then discussed. Finally, the chapter concludes by outlining some emerging research trends in this exicting field of cryptography.
Cryptography and Security
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is: how to perform calculations on encrypted data while protecting data privacy. Specifically, the paper explores Homomorphic Encryption (HE) technology, which is a technology that can directly calculate encrypted data without decryption. The paper mainly focuses on the following points: 1. **Basic concepts of homomorphic encryption**: Defines the homomorphic encryption system and its key characteristics, including additive homomorphic, multiplicative homomorphic, and algebraic homomorphic encryption systems that support both addition and multiplication simultaneously. 2. **Historical background of homomorphic encryption**: Reviews the development process of homomorphic encryption, from the concept of homomorphic encryption first proposed by Rivest et al. in 1978 to the theoretical proof of the possibility of Fully Homomorphic Encryption (FHE) by Craig Gentry in 2009. 3. **Application scenarios of homomorphic encryption**: Discusses the potential of homomorphic encryption in various application scenarios, such as secure multi - party computation, privacy - protected data mining, cloud storage and computing, etc. 4. **Limitations of existing homomorphic encryption schemes**: Analyzes the shortcomings of current homomorphic encryption schemes, including inefficiency, security issues, and ciphertext expansion problems. 5. **Future research directions**: Proposes future research directions and trends in the field of homomorphic encryption, aiming to solve the limitations of existing technologies and promote the practical application of homomorphic encryption technology. Through these contents, the paper aims to provide readers with a comprehensive overview of homomorphic encryption technology and explore its potential and challenges in practical applications.