Survey on Homomorphic Encryption and Address of New Trend

作者: Ayman Alharbi , Haneen Zamzami , Eman Samkri

DOI: 10.14569/IJACSA.2020.0110774

关键词: EncryptionComputer scienceSecure communicationPublic-key cryptographyCloud computingComputer securityLiterature surveyCloud computing securityHomomorphic encryptionVehicular ad hoc network

摘要: Encryption is the process of disguising text to ensure confidentiality data transmitted from one party another. Homomorphic encryption most important encryption-related processes which allows performing operation over encrypted data. Using different public key algorithms, homo-morphic can be implemented in any scheme. There are many algorithms secure operations and stor-age, after calculations obtain same results. While there a considerable contribution enhancement field homomorphic for various performance metrics, still an necessity clarify applications dealing with this technology. Recently, distinguished research papers have been filed address need encryption. Example these but not limited : Vehicle (v2v) communication, cloud security, Vehicular ad-hoc networks (VANET), Blockchain, E-Voting, Data mining privacy preserving healthcare sector. This article aims introduce literature survey close gap systems their protection privacy. We focus on above-mentioned present our recommendations future work.

参考文章(20)
Dan Boneh, Craig Gentry, A fully homomorphic encryption scheme Stanford University. ,(2009)
Khaled Rabieh, Mohamed M. E. A. Mahmoud, Marianne Azer, Mahmoud Allam, A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks Security and Communication Networks. ,vol. 8, pp. 3271- 3281 ,(2015) , 10.1002/SEC.1251
N. P. Smart, F. Vercauteren, Fully homomorphic encryption with relatively small key and ciphertext sizes public key cryptography. pp. 420- 443 ,(2010) , 10.1007/978-3-642-13013-7_25
Carlos Aguilar-Melchor, Simon Fau, Caroline Fontaine, Guy Gogniat, Renaud Sirdey, Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain IEEE Signal Processing Magazine. ,vol. 30, pp. 108- 117 ,(2013) , 10.1109/MSP.2012.2230219
Z. Erkin, J. R. Troncoso-pastoriza, R. L. Lagendijk, F. Perez-Gonzalez, Privacy-preserving data aggregation in smart metering systems: an overview IEEE Signal Processing Magazine. ,vol. 30, pp. 75- 86 ,(2013) , 10.1109/MSP.2012.2228343
J. R. Troncoso-pastoriza, F. Perez-Gonzalez, Secure signal processing in the cloud: enabling technologies for privacy-preserving multimedia cloud processing IEEE Signal Processing Magazine. ,vol. 30, pp. 29- 41 ,(2013) , 10.1109/MSP.2012.2228533
Caroline Fontaine, Fabien Galand, A Survey of Homomorphic Encryption for Nonspecialists Eurasip Journal on Information Security. ,vol. 2007, pp. 15- ,(2007) , 10.1155/2007/13801
Aderemi A. Atayero, Oluwaseyi Feyisetan, Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption CIS Journals. ,(2011)
Julien Bringer, Herve Chabanne, Alain Patey, Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends IEEE Signal Processing Magazine. ,vol. 30, pp. 42- 52 ,(2013) , 10.1109/MSP.2012.2230218
Payal V.Parmar, Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, Rutvij H. Jhaveri, Survey of Various Homomorphic Encryption algorithms and Schemes International Journal of Computer Applications. ,vol. 91, pp. 26- 32 ,(2014) , 10.5120/15902-5081