Skip to main content

Introduction

  • Chapter
  • First Online:
  • 1196 Accesses

Part of the book series: Computer Architecture and Design Methodologies ((CADM))

Abstract

This is the era of communication and data sharing, which requires secure and confidential transactions. Cryptography is the science that concerns the maintenance and analysis of security, which allows authorized access to information. Cloud computing is one of the new applications, where cryptography is expected to unveil its power to provide desired security solutions. In particular, fully homomorphic encryption (FHE) is one of the main pillars to exploit the complete advantages of cloud computing.

Going to the cloud, has always been the dream of man.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Archer D, Chen L, Cheon JH, Gilad-Bachrach R, Hallman RA, Huang Z, Jiang X, Kumaresan R, Malin BA, Sofia H, Song Y, Wang S (2017) Applications of homomorphic encryption

    Google Scholar 

  • Ekberg JE, Kostiainen K, Asokan N (2013) Trusted execution environments on mobile devices. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, CCS’13. ACM, New York, pp 1497–1498

    Google Scholar 

  • Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105

    Article  Google Scholar 

  • Rass S, Slamanig D (2013) Cryptography for security and privacy in cloud computing. Artech House Inc, Norwood

    Google Scholar 

  • Stinson DR (2005) Cryptography: theory and practice, Third Edition edn. Chapman & Hall/CRC, Boca Raton (Discrete Mathematics and Its Applications)

    MATH  Google Scholar 

  • Xiao L, Bastani O, Yen IL (2012) An efficient homomorphic encryption protocol for multi-user systems. IACR Cryptology ePrint Archive

    Google Scholar 

  • Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen PS (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayantika Chatterjee .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chatterjee, A., Aung, K.M.M. (2019). Introduction. In: Fully Homomorphic Encryption in Real World Applications. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-13-6393-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6393-1_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6392-4

  • Online ISBN: 978-981-13-6393-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics