Abstract
This is the era of communication and data sharing, which requires secure and confidential transactions. Cryptography is the science that concerns the maintenance and analysis of security, which allows authorized access to information. Cloud computing is one of the new applications, where cryptography is expected to unveil its power to provide desired security solutions. In particular, fully homomorphic encryption (FHE) is one of the main pillars to exploit the complete advantages of cloud computing.
Going to the cloud, has always been the dream of man.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Archer D, Chen L, Cheon JH, Gilad-Bachrach R, Hallman RA, Huang Z, Jiang X, Kumaresan R, Malin BA, Sofia H, Song Y, Wang S (2017) Applications of homomorphic encryption
Ekberg JE, Kostiainen K, Asokan N (2013) Trusted execution environments on mobile devices. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, CCS’13. ACM, New York, pp 1497–1498
Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105
Rass S, Slamanig D (2013) Cryptography for security and privacy in cloud computing. Artech House Inc, Norwood
Stinson DR (2005) Cryptography: theory and practice, Third Edition edn. Chapman & Hall/CRC, Boca Raton (Discrete Mathematics and Its Applications)
Xiao L, Bastani O, Yen IL (2012) An efficient homomorphic encryption protocol for multi-user systems. IACR Cryptology ePrint Archive
Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen PS (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Chatterjee, A., Aung, K.M.M. (2019). Introduction. In: Fully Homomorphic Encryption in Real World Applications. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-13-6393-1_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-6393-1_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6392-4
Online ISBN: 978-981-13-6393-1
eBook Packages: EngineeringEngineering (R0)