Skip to main content

Homomorphic Cryptography and Its Applications in Various Domains

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 55))

Abstract

Homomorphic encryption (HE) is an encryption technique where operations are performed on ciphertext. This encryption method can be used in varieties of applications by using public key algorithms. For transferring data from one place to another, there are various encryption algorithms for storage of data and securing the operations, but they do not preserve privacy. HE is useful in various applications in which HE performs the different operations on encrypted data and provides results after calculations performed directly on the plaintext. Nowadays, security of information and calculations to deal with the data of big business has expanded massively. In any case, a basic issue emerges when there is a necessity of registering on such encrypted information where protection is built up. This paper represents homomorphic cryptosystems for preserving security, properties, and categories of homomorphic encryption. In addition to this, privacy-preserving applications of homomorphic cryptosystems in the field of cloud computing, private information retrieval, and data aggregation in wireless sensor network are also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gentry C (2009) Fully Homomorphic Encryption Scheme. Ph.D. thesis, Stanford University, manuscript. http://crypto.stanford.edu/craig

  2. Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM annual symposium theory of computing (STOC ’09), pp 169–178

    Google Scholar 

  3. Gentry C (2010) Computing arbitrary functions of encrypted data. Comm. ACM 53(3):97–105

    Article  Google Scholar 

  4. Gentry C (2010) Toward basing fully homomorphic encryption on worst-case hardness. In: Proceedings of the 30th annual conference on advances in cryptology (CRYPTO ’10), pp 116–137

    Chapter  Google Scholar 

  5. Damgard JM (2001) A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Proceedings of the fourth international workshop practice and theory in public key cryptography (PKC ’01), pp 119–136

    Chapter  Google Scholar 

  6. Chauhan KK, Sanger AKS, Verma A (2015) Homomorphic encryption for data security in cloud computing. In: 14th international conference on information technology

    Google Scholar 

  7. El Makkaoui K, Hssane AB, Ezzati A (2015) Challenges of using homomorphic encryption to secure cloud computing. IEEE

    Google Scholar 

  8. Anand V, Satapathy SC (2016) Homomorphic encryption for secure information retrieval from the cloud. In: IEEE conference

    Google Scholar 

  9. Chen H, Hu Y, Jia H (2015) An additively homomorphic encryption from ideal lattices. In: 10th international conference on P2P, parallel, grid, cloud and internet computing

    Google Scholar 

  10. Biksham V, Vasumathi D (2016) Query based computations on encrypted data through homomorphic encryption in cloud computing security. In: International conference on electrical, electronics, and optimization techniques (ICEEOT)

    Google Scholar 

  11. Wang D, Guo B, Shen Y, Shen Y, Lin Y-H (2017) A faster fully homomorphic encryption scheme in big data. In: 2nd international conference on big data analysis, IEEE conference 2017

    Google Scholar 

  12. Bouti A, Keller J (2015) Towards practical homomorphic encryption in cloud computing. In: 4th symposium on network cloud computing and applications, IEEE conference 2015

    Google Scholar 

  13. Engouang TD, Yun L (2013) Aggregate over multi-hop homomorphic encrypted data in wireless sensor networks. In: 2nd international symposium on instrumentation and measurement, sensor network and automation (IMSNA), IEEE Conference 2013

    Google Scholar 

  14. Mittal D, Kaur D, Aggarwal A (2014) Secure data mining in cloud using homomorphic encryption, IEEE conference 2014

    Google Scholar 

  15. Tebaa M, El Hajji S, El Ghazi A (2012) Homomorphic encryption method applied to cloud computing. IEEE

    Google Scholar 

  16. Zhang J, Yang Y, Chen Y, Chen J, Zhang Q (2017) A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Comput Netw 129:37–50

    Article  Google Scholar 

  17. Zhang L, Zheng Y, Kantoa R (2016) A review of homomorphic encryption and its applications. IEEE

    Google Scholar 

  18. Mbarek M, Kartit A, Ouahmane H (2016) Applying homomorphic encryption for securing cloud database. In: 4th IEEE international colloquium on information science and technology (CiSt)

    Google Scholar 

  19. Oza P, Sharma P (2014) Optimized data aggregation protocol in WSN for automation of water sprinklers. IJCSC 5(1):46–50. ISSN-0973-7391 (March–September 2014)

    Google Scholar 

  20. Ramotsoela TD, Hancke GP (2015) Data aggregation using homomorphic encryption in wireless sensor networks. In: IEEE conference on information security for South Africa (ISSA)

    Google Scholar 

  21. Shinde SS, Shukla S, Chitre DK (2013) Secure E-voting using homomorphic technology. Int J Emerg Technol Adv Eng 3(8):203–206

    Google Scholar 

  22. Acquisti A (2004) Receipt-free homomorphic elections and write-in voter verified ballots. Technical report 2004/105, CMU-ISRI-04-116 (2004)

    Google Scholar 

  23. HaiBin Y, Ling Z (2016) A secure private information retrieval in cloud environment. In: 2016 international conference on intelligent networking and collaborative systems

    Google Scholar 

  24. Xun Y, Kaosar MG, Paulet R, Bertino E (2013) Single-database private information retrieval from fully homomorphic encryption. IEEE Trans Knowl Data Eng 25:1125–1134

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Namrata Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, N., Oza, P., Agrawal, S. (2019). Homomorphic Cryptography and Its Applications in Various Domains. In: Bhattacharyya, S., Hassanien, A., Gupta, D., Khanna, A., Pan, I. (eds) International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55. Springer, Singapore. https://doi.org/10.1007/978-981-13-2324-9_27

Download citation

Publish with us

Policies and ethics