Homomorphic encryption systems statement: Trends and challenges

被引:54
作者
Alaya, Bechir [1 ]
Laouamer, Lamri [1 ]
Msilini, Nihel [2 ]
机构
[1] Qassim Univ, Coll Business & Econ, Dept Management Informat Syst, Buraydah 51452, Saudi Arabia
[2] Univ Gabes, IResCoMath, Ave Omar Ibn El Khattab, Zerig 6029, Gabes, Tunisia
关键词
Cloud computing; Managing medical systems; Encryption methods; Homomorphic encryption; Security; Encryption systems; THRESHOLD ENCRYPTION;
D O I
10.1016/j.cosrev.2020.100235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For securing our own systems, encryption got the major interest, especially when talking about homomorphic encryption, which has spread like wildfire. Therefore, in this study, we will be presenting different known cryptosystems based, in a great part of its construction, on the homomorphic encryption, all joined with other techniques to enhance the cryptosystem performance and the privacy ratio. In addition, the homomorphic encryption has the feature to be highly adequate with any field it is used in, giving numerous advantages and a tremendous performance. Hence, the following survey presents different domains using homomorphic encryption and a final comparison between the adopted techniques. (c) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 80 条
[21]   About Fully Homomorphic Encryption Improvement Techniques: NISS2018 Conference Paper [J].
El-Yahyaoui, Ahmed ;
El Kettani, Mohamed Daifr Ech-Cherif .
INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS), 2019, 10 (03) :1-20
[22]   A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption [J].
Elhoseny, Mohamed ;
Elminir, Hamdy ;
Riad, Alaa ;
Yuan, Xiaohui .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) :262-275
[23]  
Elias Y., 2015, P WIN3 WORKSH DIR NU, P271
[24]  
Faris A., 2019, SE EUR J SOFT COMPUT, V8, P35
[25]  
Feng Chao, 2014, [The Journal of China Universities of Posts and Telecommunications, 中国邮电高校学报], V21, P37
[26]   Enhancing information lookup privacy through homomorphic encryption [J].
Fotiou, N. ;
Trossen, D. ;
Marias, G. F. ;
Kostopoulos, A. ;
Polyzos, G. C. .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) :2804-2814
[27]   Cryptanalysis of the Co-ACD Assumption [J].
Fouque, Pierre-Alain ;
Lee, Moon Sung ;
Lepoint, Tancrede ;
Tibouchi, Mehdi .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :561-580
[28]   Algorithms for the approximate common divisor problem [J].
Galbraith, Steven D. ;
Gebregiyorgis, Shishay W. ;
Murphy, Sean .
LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2016, 19 :58-72
[29]  
Gbash EK, 2017, BAGHDAD SCI J, V14, P651, DOI 10.21123/bsj.2017.14.3.0651
[30]   A Survey of Gaussian Convolution Algorithms [J].
Getreuer, Pascal .
IMAGE PROCESSING ON LINE, 2013, 3 :286-310