B. Shuriya,S. Vimal Kumar,K. Bagyalakshmi
Abstract:In this paper, we introduce the Fully Homomorphic Integrity Model (HIM), a novel approach designed to enhance security, efficiency, and reliability in encrypted data processing, primarily within the health care industry. HIM addresses the key challenges that noise accumulation, computational overheads, and data integrity pose during homomorphic operations. Our contribution of HIM: advances in noise management through the rational number adjustment; key generation based on personalized prime numbers; and time complexity analysis details for key operations. In HIM, some additional mechanisms were introduced, including robust mechanisms of decryption. Indeed, the decryption mechanism ensures that the data recovered upon doing complex homomorphic computation will be valid and reliable. The healthcare id model is tested, and it supports real-time processing of data with privacy maintained concerning patients. It supports analytics and decision-making processes without any compromise on the integrity of information concerning patients. Output HIM promotes the efficiency of encryption to a greater extent as it reduces the encryption time up to 35ms and decryption time up to 140ms, which is better when compared to other models in the existence. Ciphertext size also becomes the smallest one, which is 4KB. Our experiments confirm that HIM is indeed a very efficient and secure privacy-preserving solution for healthcare applications
What problem does this paper attempt to address?
### What problems does this paper attempt to solve?
This paper aims to solve the key challenges in securely processing encrypted data in the healthcare field, especially the problems of noise accumulation, computational overhead, and data integrity in Homomorphic Encryption (HE). Specifically:
1. **Noise accumulation**: During the homomorphic encryption process, noise accumulates as operations increase, which may eventually lead to decryption errors or inaccurate results. This is especially crucial for the healthcare industry that requires high - precision data.
2. **Computational overhead**: Traditional homomorphic encryption methods are usually accompanied by high computational costs, especially when dealing with large - scale data sets, which limits their practical applications.
3. **Data integrity**: Ensuring that encrypted data can maintain its integrity and reliability after complex homomorphic calculations is vital for the privacy protection of medical data.
To solve these problems, the author proposes a brand - new framework - the Fully Homomorphic Integrity Model (HIM). HIM improves existing methods in the following ways:
- **Noise management**: It introduces a noise management technique based on rational number adjustment to reduce the impact of noise accumulation on calculation results.
- **Personalized prime number generation**: It uses personalized prime number generation for public - private key pairs, which improves the security and efficiency of keys.
- **Time complexity analysis**: It analyzes in detail the time complexity of key operations to optimize performance.
In addition, HIM also includes a powerful decryption mechanism to ensure that data after complex homomorphic calculations can be correctly and reliably recovered. Experimental results show that HIM is superior to existing methods in terms of encryption time, decryption time, and ciphertext size, especially in applications in the healthcare field.
### Formula display
The following are some key formulas involved in the paper:
1. **Key generation formula**:
\[
pbk=(a_0, rs_1, \delta(i, y(1 < i < \beta, 1 < y < 2)))
\]
where \(a_0\) is a pseudo - random prime number, \(rs_1\) is a random seed, and \(\delta(i, y)\) describes the parameters of the encryption structure.
2. **Encryption formula**:
\[
CT = d+2r + 2\sum_{1\leq i,j,k\leq\beta}y(i,j,k)\cdot a(i,0)\cdot a(j,1)\cdot a(k,2)
\]
where \(d\) is the original data, \(2r\) adds randomness, and \(\sum\) represents coefficients or values related to the given calculation.
3. **Homomorphic operation formula (addition)**:
\[
CT_{\text{result}}=(CT_1 + CT_2)\bmod a_0
\]
4. **Denoising formula (Bootstrapping)**:
\[
\text{Output}=(CT-\sum_{t = 0}^s v_t)\bmod 2
\]
5. **Decryption formula**:
\[
d=(CT-\sum_{i,j,k}m_i^{(0)}\cdot m_j^{(1)}\cdot m_k^{(2)}\cdot x(i,j,k))\bmod 2
\]
These formulas together ensure that HIM can encrypt information, operate on it, and recover the original information while maintaining data integrity and confidentiality.