Advertisement

Journal of Mathematical Sciences

, Volume 237, Issue 3, pp 353–361 | Cite as

Applied Homomorphic Cryptography: Examples

  • G. G. ArakelovEmail author
  • A. V. Gribov
  • A. V. Mikhalev
Article
  • 10 Downloads

Abstract

This paper is devoted to the application aspects of homomorphic cryptography. It provides a description of a fully homomorphic matrix polynomial-based encryption scheme. It also gives the results of practical comparison of fully homomorphic encryption schemes. We consider some special cases of homomorphic encryption allowing computations of a limited number of functions.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    D. Boneh, C. Gentry, S. Halevi, F. Wang, and D. J. Wu, “Private database queries using somewhat homomorphic encryption,” in: M. Jacobson, M. Locasto, P. Mohassel, and R. Safavi-Naini, eds., Applied Cryptography and Network Security: 11th Int. Conf., ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proc., Lect. Notes Comp. Sci. Security Cryptology, Vol. 7954, Springer, Berlin (2013), pp. 102–118.Google Scholar
  2. 2.
    D. Boneh, A. Sahai, and B. Waters, “Functional encryption: Definitions and challenges,” Theory Cryptography, 253–273 (2011).Google Scholar
  3. 3.
    F. B. Burtyka, “Symmetric fully homomorphic encryption using irreducible matrix polynomials,” Izv. Yuzhn. Federal. Univ. Tekhn. Nauki, 107–122 (2014).Google Scholar
  4. 4.
    D. Cash, J. Jaeger, St. Jarecki, Ch. Jutla, H. Krawczyk, M.-Cat. Rosu, and M. Steiner, “Highly-scalable searchable symmetric encryption with support for Boolean queries,” in: R. Canetti and J. A. Garay, eds., Advances in Cryptology — CRYPTO 2013: 33rd Annual Cryptology Conf., Santa Barbara, CA, USA, August 18–22, 2013. Proc., Pt. 1, Lect. Notes Comp. Sci. Security Cryptology, Vol. 8042, Springer, Berlin (2013), pp. 353–373.Google Scholar
  5. 5.
    D. Cash, J. Jaeger, St. Jarecki, Ch. Jutla, H. Krawczyk, M.-Cat. Rosu, and M. Steiner, Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation, Cryptology ePrint Archive: Report 2014/853.Google Scholar
  6. 6.
    R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in: Proc. 13th ACM Conf. Computer Communication Security, ACM, New York (2006).Google Scholar
  7. 7.
    C. Gentry, A Fully Homomorphic Encryption Scheme, Ph.D. thesis, Stanford Univ. (2009).Google Scholar
  8. 8.
    M. M. Glukhov, V. P. Elizarov, and A. A. Nechaev, Algebra [in Russian], Lan, St. Petersburg (2015).Google Scholar
  9. 9.
    S. Gorbunov, V. Vaikuntanathan, and H. Wee, “Functional encryption with bounded collusions via multi-party computation,” in: R. Safavi-Naini and R. Canetti, eds., Advances in Cryptology — CRYPTO 2012 Lect. Notes Comp. Sci., Vol. 7417, Springer, Berlin (2012), pp. 162–179.Google Scholar
  10. 10.
    A. V. Gribov, P. A. Zolotykh, and A. V. Mikhalev, “Constructing algebraic cryptosystems over quasigroup ring,” Math. Probl. Cryptography, 1, No. 4, 23–32 (2010).Google Scholar
  11. 11.
    S. Y. Katyshev, V. T. Markov, and A. A. Nechaev, “The use of non-associative groupoids for the implementation of public key distribution procedure,” Discrete Math., 26, No. 3, 45–64 (2014).Google Scholar
  12. 12.
    A. S. Kuzmin, V. T. Markov, A. A. Mikhalev, A. V. Mikhalev, and A. A. Nechaev, “Cryptographic algorithms on groups and algebras,” Fundam. Prikl. Mat., 20, No. 1, 205–222 (2015).zbMATHGoogle Scholar
  13. 13.
    D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in: SP ’00 Proc. 2000 IEEE Symp. Security and Privacy, Univ. California, Berkeley (2000).Google Scholar
  14. 14.
    D. Stehle and R. Steinfeld, “Faster fully homomorphic encryption,” in: Advances in Cryptology — ASIACRYPT 2010: 16th Int. Conf. on the Theory and Application of Cryptology and Information Security, Singapore, December 5–9, 2010. Proc., Lect. Notes Comp. Sci., Vol. 6477, Springer, Berlin (2010), pp. 377–394.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • G. G. Arakelov
    • 1
    Email author
  • A. V. Gribov
    • 1
  • A. V. Mikhalev
    • 1
  1. 1.Moscow State UniversityMoscowRussia

Personalised recommendations