Homomorphic encryption systems statement: Trends and challenges

被引:54
作者
Alaya, Bechir [1 ]
Laouamer, Lamri [1 ]
Msilini, Nihel [2 ]
机构
[1] Qassim Univ, Coll Business & Econ, Dept Management Informat Syst, Buraydah 51452, Saudi Arabia
[2] Univ Gabes, IResCoMath, Ave Omar Ibn El Khattab, Zerig 6029, Gabes, Tunisia
关键词
Cloud computing; Managing medical systems; Encryption methods; Homomorphic encryption; Security; Encryption systems; THRESHOLD ENCRYPTION;
D O I
10.1016/j.cosrev.2020.100235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For securing our own systems, encryption got the major interest, especially when talking about homomorphic encryption, which has spread like wildfire. Therefore, in this study, we will be presenting different known cryptosystems based, in a great part of its construction, on the homomorphic encryption, all joined with other techniques to enhance the cryptosystem performance and the privacy ratio. In addition, the homomorphic encryption has the feature to be highly adequate with any field it is used in, giving numerous advantages and a tremendous performance. Hence, the following survey presents different domains using homomorphic encryption and a final comparison between the adopted techniques. (c) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 80 条
[1]  
Abu Aziz Ahmed A., 2018, International Journal of Computer Network and Information Security, V10, P44, DOI 10.5815/ijcnis.2018.01.06
[2]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[3]  
Afifi A, 2019, INT J ADV COMPUT SC, V10, P452
[4]  
Ahlawat P., 2015, INT J ENHANC RES SCI, V4, P145
[5]  
Al-Sit WT, 2019, INT J ADV COMPUT SC, V10, P300
[6]   Elliptic Curve Lightweight Cryptography: A Survey [J].
Andres Lara-Nino, Carlos ;
Diaz-Perez, Arturo ;
Morales-Sandoval, Miguel .
IEEE ACCESS, 2018, 6 :72514-72550
[7]  
[Anonymous], ENV SCI POLLUT RES
[8]  
[Anonymous], 2014, International Journal of Computer Applications, DOI DOI 10.5120/15902-5081
[9]  
Any I.B., 2016, MATH COMBINATORICS
[10]  
Armknecht F., 2015, Cryptology ePrint Archive, Paper 2015/1192, P1192