4A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications
Rashmi Salavi1,2*, Dr. M. M. Math2 and Dr. U. P. Kulkarni3
1Ramrao Adik Institute of Technology, Navi Mumbai, Maharashtra
2KLS Gogte Institute of Technology, Belagavi, Karnataka
3SDM College of Engineering and Technology, Dharwad, Karnataka
*Corresponding author: rashmisalvi@gmail.com
Abstract
The adoption of cloud platforms is gradually increasing due to the several benefits of cloud computing. Despite the numerous benefits of cloud computing, data security and privacy is a major concern, due to lack of trust on cloud service provider (CSP). Data security can be achieved through the cryptographic techniques, but processing on encrypted data requires the sharing of a secret key with the CSP to perform operations on cloud data. This leads to the breach of data privacy. The power of cloud computing is fully utilized if one is able to perform computations on encrypted data outsourced to the cloud. Homomorphic Encryption (HE) enables to store data in encrypted form and perform computations on it without revealing the secret key to CSP. This chapter highlights existing HE techniques, their implementations in various libraries, and existing work in the field of computations on homomorphic encryption used in various applications like healthcare, financial.
Keywords: Fully homomorphic encryption, HElib, SEAL, LibScarab, TFHE, FHEW
4.1 Introduction
Cloud computing delivers IT resources, such as ...
Get Cyber Security and Digital Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.