Abstract
Homomorphic encryption is a very useful tool with a number of attractive applications. However, the applications are limited by the fact that only one operation is possible (usually addition or multiplication in the plaintext space) to be able to manipulate the plaintext by using only the ciphertext. What would really be useful is to be able to utilize both addition and multiplication simultaneously. This would permit more manipulation of the plaintext by modifying the ciphertext. In fact, this would allow one without the secret key to compute any efficiently computable function on the plaintext when given only the ciphertext. In this chapter, we introduce fully homomorphic encryption (FHE) techniques, which allow one to evaluate both addition and multiplication of plaintext, while remaining encrypted. The concept of FHE was introduced by Rivest [14] under the name privacy homomorphisms. The problem of constructing a scheme with these properties remained unsolved until 2009, when Gentry [6] presented his breakthrough result. His scheme allows arbitrary computation on the ciphertexts and it yields the correct result when decrypted. This chapter begins with an introduction of FHE model and definitions, followed by the construction of FHE scheme over integers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Z. Brakerski, C. Gentry, V. Vaikuntanathan, (Leveled) fully homomorphic encryption without bootstrapping, in Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS’12, 2012, pp. 309–325
D. Coppersmith, Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptol. 10(4), 233–260 (1997)
J.S. Coron, T. Lepoint, M. Tibouchi, Batch fully homomorphic encryption over the integers, in Proceedings of Advances in Cryptology, EUROCRYPT’13, 2013, pp. 315–335
J.S. Coron, D. Naccache, M. Tibouchi, Public key compression and modulus switching for fully homomorphic encryption over the integers, in Proceedings of Advances in Cryptology, EUROCRYPT’12, 2012, pp. 446–464
M. van Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, Fully homomorphic encryption over the integers, in Proceedings of Advances in Cryptology, EUROCRYPT’10, 2010, pp. 24–43
C. Gentry, Fully homomorphic encryption using ideal lattices, in Proceedings of STOC’09, 2009, pp. 169–178
C. Gentry, Fully Homomorphic Encryption Using Ideal Lattices. PhD thesis, 2009
C. Gentry, S. Halevi, Implementing Gentry fully-homomorphic encryption scheme, in Proceedings of Advances in Cryptology, EUROCRYPT’11, 2011, pp.129–148
S. Halevi, An implementation of homomorphic encryption. http://github.com/shaih/HELib
N. Howgrave-Graham, Approximate integer common divisors, in Proceedings of Cryptology and Latticed, CaLC’01, 2001, pp. 51–66
J.C. Lagarias, The computational complexity of simultaneous diophantine approximation problems. SIAM J. Comput. 14(1), 196–209 (1985)
P.Q. Nguyen, I. Shparlinski, On the insecurity of a server-aided RSA protocol, in Proceedings of Advances in Cryptology, ASIACRYPT’01, 2001, pp. 21–35
P.Q. Nguyen, J. Stern, Adapting density attacks to low-weight knapsacks, in Proceedings of Advances in Cryptology, ASIACRYPT’05, 2005, pp. 41–58
R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2), 120–126 (1978)
N. Smart, F. Vercauteren, Fully homomorphic encryption with relatively small key and ciphertext sizes, in Proceedings of PKC’10, 2010, pp. 420–443
D. Stehle, R. Steinfeld, Faster fully homomorphic encryption, in Proceedings of Advances in Cryptology, ASIACRYPT’10, 2010, pp. 377–394
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Xun Yi, Russell Paulet, Elisa Bertino
About this chapter
Cite this chapter
Yi, X., Paulet, R., Bertino, E. (2014). Fully Homomorphic Encryption. In: Homomorphic Encryption and Applications. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-12229-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-12229-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12228-1
Online ISBN: 978-3-319-12229-8
eBook Packages: Computer ScienceComputer Science (R0)