Abstract
Homomorphic encryption (HE) is an encryption technique where operations are performed on ciphertext. This encryption method can be used in varieties of applications by using public key algorithms. For transferring data from one place to another, there are various encryption algorithms for storage of data and securing the operations, but they do not preserve privacy. HE is useful in various applications in which HE performs the different operations on encrypted data and provides results after calculations performed directly on the plaintext. Nowadays, security of information and calculations to deal with the data of big business has expanded massively. In any case, a basic issue emerges when there is a necessity of registering on such encrypted information where protection is built up. This paper represents homomorphic cryptosystems for preserving security, properties, and categories of homomorphic encryption. In addition to this, privacy-preserving applications of homomorphic cryptosystems in the field of cloud computing, private information retrieval, and data aggregation in wireless sensor network are also presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gentry C (2009) Fully Homomorphic Encryption Scheme. Ph.D. thesis, Stanford University, manuscript. http://crypto.stanford.edu/craig
Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM annual symposium theory of computing (STOC ’09), pp 169–178
Gentry C (2010) Computing arbitrary functions of encrypted data. Comm. ACM 53(3):97–105
Gentry C (2010) Toward basing fully homomorphic encryption on worst-case hardness. In: Proceedings of the 30th annual conference on advances in cryptology (CRYPTO ’10), pp 116–137
Damgard JM (2001) A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Proceedings of the fourth international workshop practice and theory in public key cryptography (PKC ’01), pp 119–136
Chauhan KK, Sanger AKS, Verma A (2015) Homomorphic encryption for data security in cloud computing. In: 14th international conference on information technology
El Makkaoui K, Hssane AB, Ezzati A (2015) Challenges of using homomorphic encryption to secure cloud computing. IEEE
Anand V, Satapathy SC (2016) Homomorphic encryption for secure information retrieval from the cloud. In: IEEE conference
Chen H, Hu Y, Jia H (2015) An additively homomorphic encryption from ideal lattices. In: 10th international conference on P2P, parallel, grid, cloud and internet computing
Biksham V, Vasumathi D (2016) Query based computations on encrypted data through homomorphic encryption in cloud computing security. In: International conference on electrical, electronics, and optimization techniques (ICEEOT)
Wang D, Guo B, Shen Y, Shen Y, Lin Y-H (2017) A faster fully homomorphic encryption scheme in big data. In: 2nd international conference on big data analysis, IEEE conference 2017
Bouti A, Keller J (2015) Towards practical homomorphic encryption in cloud computing. In: 4th symposium on network cloud computing and applications, IEEE conference 2015
Engouang TD, Yun L (2013) Aggregate over multi-hop homomorphic encrypted data in wireless sensor networks. In: 2nd international symposium on instrumentation and measurement, sensor network and automation (IMSNA), IEEE Conference 2013
Mittal D, Kaur D, Aggarwal A (2014) Secure data mining in cloud using homomorphic encryption, IEEE conference 2014
Tebaa M, El Hajji S, El Ghazi A (2012) Homomorphic encryption method applied to cloud computing. IEEE
Zhang J, Yang Y, Chen Y, Chen J, Zhang Q (2017) A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Comput Netw 129:37–50
Zhang L, Zheng Y, Kantoa R (2016) A review of homomorphic encryption and its applications. IEEE
Mbarek M, Kartit A, Ouahmane H (2016) Applying homomorphic encryption for securing cloud database. In: 4th IEEE international colloquium on information science and technology (CiSt)
Oza P, Sharma P (2014) Optimized data aggregation protocol in WSN for automation of water sprinklers. IJCSC 5(1):46–50. ISSN-0973-7391 (March–September 2014)
Ramotsoela TD, Hancke GP (2015) Data aggregation using homomorphic encryption in wireless sensor networks. In: IEEE conference on information security for South Africa (ISSA)
Shinde SS, Shukla S, Chitre DK (2013) Secure E-voting using homomorphic technology. Int J Emerg Technol Adv Eng 3(8):203–206
Acquisti A (2004) Receipt-free homomorphic elections and write-in voter verified ballots. Technical report 2004/105, CMU-ISRI-04-116 (2004)
HaiBin Y, Ling Z (2016) A secure private information retrieval in cloud environment. In: 2016 international conference on intelligent networking and collaborative systems
Xun Y, Kaosar MG, Paulet R, Bertino E (2013) Single-database private information retrieval from fully homomorphic encryption. IEEE Trans Knowl Data Eng 25:1125–1134
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, N., Oza, P., Agrawal, S. (2019). Homomorphic Cryptography and Its Applications in Various Domains. In: Bhattacharyya, S., Hassanien, A., Gupta, D., Khanna, A., Pan, I. (eds) International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55. Springer, Singapore. https://doi.org/10.1007/978-981-13-2324-9_27
Download citation
DOI: https://doi.org/10.1007/978-981-13-2324-9_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2323-2
Online ISBN: 978-981-13-2324-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)