Homomorphic Encryption: Review and Applications

  • Ratnakumari ChallaEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 37)


In a recent decade, homomorphic encryption became more popular because of its special properties. Homomorphic encryption is identified to be the key candidate for providing security on the cloud data. The cloud-based applications and service providers have given an extreme importance to homomorphic encryption when compared to other security techniques. In this work, an effort is made to present an overview of the homomorphic encryption and its different types. At a broad level, the various potential applications of homomorphic encryption are discussed to demonstrate the importance of homomorphic encryption in the various areas.


Encrypted data Public cloud Secure Homomorphic encryption E-voting Information retrieval 


  1. 1.
    R. Rivest, L. Adleman, M. Dertouzos, M., On data banks and privacy homomorphisms. Found. Secur. Comput., 169–180 (1978)Google Scholar
  2. 2.
    W. Stallings, Cryptography and Network Security Principles and Practices Fourth Edition, Pearson Education, Prentice Hall (2009)Google Scholar
  3. 3.
    C. Gentry, A Fully Homomorphic Encryption Scheme. PhD thesis, Stanford (2009)Google Scholar
  4. 4.
    C. Gentry, Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)CrossRefGoogle Scholar
  5. 5.
    N. Islam, W. Puech, K. Hayat, R. Brouzet, Application of homomorphism to secure image sharing. Opt. Commun. 284, 4412–4429 (2011)CrossRefGoogle Scholar
  6. 6.
    A.M. Vengadapurvaja, G. Nisha, R. Aarthy, N. Sasikaladevi, An efficient homomorphic medical image encryption algorithm for cloud storage security. Proced Comput. Sci. 115, 643–650 (2017), ElsevierGoogle Scholar
  7. 7.
    C. Pan Yang, X. Gui, J. A., F. Tian, An efficient secret key homomorphic encryption used in image processing service. Secur. Commun. Netw. 2017, Article ID 7695751, 11 p. (2017). Scholar
  8. 8.
    D. Archer, L. Chen, J. Hee Cheon, R. Gilad-Bachrach, R.A. Hallman, Z. Huang, X. Jiang, R. Kumaresan, B.A. Malin, H. Sofia, Y. Song, S. Wang, Applications of homomorphic encryption, crypto standardization workshop presentation, microsoft research (2017)Google Scholar
  9. 9.
    O. Kocabas, Design and analysis of privacy-preserving medical cloud computing systems, PhD thesis, University of Rochester Rochester, New York (2016)Google Scholar
  10. 10.
    I. Jabbar, S.N. Alsaad, Design and implementation of secure remotee-voting system using homomorphic encryption. Int. J. Netw. Secur. 19(5), 694–703 (2017)Google Scholar
  11. 11.
    P. Mark, A. Will, B. Nicholson, M. Tiehuis, R.K.L. Ko, Secure voting in the cloud using homomorphic encryption and mobile agents, ICCCRI, pp. 173–184 (2015)Google Scholar
  12. 12.
    C. Gentry, Z. Ramzan, Single-database private information retrieval with constant communication rate. In: Proceedings of the 32nd International Colloquium on Automata, Languages and Programming, pp. 803–815. Springer (2005)Google Scholar
  13. 13.
    E. Kushilevitz, R. Ostrovsky, Replication is not needed: single database, computationally-private information retrieval. In: FOCS ’97: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, p. 364, Washington, DC, USA, IEEE Computer Society (1997)Google Scholar
  14. 14.
    G. Naveed, R. Batool, Biometric authentication in cloud computing. J. Biom. Biostat. 6(5) (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringRGUKT, IIIT-AP, RK ValleyKadapaIndia

Personalised recommendations