loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Michael Brenner ; Henning Perl and Matthew Smith

Affiliation: Leibniz Universitt Hannover, Germany

ISBN: 978-989-8565-24-2

Keyword(s): Homomorphic Encryption, Private Information Retrieval, Encrypted Search.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Network Security ; Secure Cloud Computing ; Security in Distributed Systems ; Sensor and Mobile Ad Hoc Network Security

Abstract: Homomorphic cryptography has been one of the most interesting topics of mathematics and computer security since Gentry presented the first construction of a fully homomorphic encryption (FHE) scheme in 2009. Since then, a number of different schemes have been found, that follow the approach of bootstrapping a fully homomorphic scheme from a somewhat homomorphic foundation. All existing implementations of these systems clearly proved, that fully homomorphic encryption is not yet practical, due to significant performance limitations. However, there are many applications in the area of secure methods for cloud computing, distributed computing and delegation of computation in general, that can be implemented with homomorphic encryption schemes of limited depth. We discuss a simple algebraically homomorphic scheme over the integers that is based on the factorization of an approximate semiprime integer. We analyze the properties of the scheme and provide a couple of known protocols that can be implemented with it. We also provide a detailed discussion on searching with encrypted search terms and present implementations and performance figures for the solutions discussed in this paper. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.205.60.226

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Brenner, M.; Perl, H. and Smith, M. (2012). Practical Applications of Homomorphic Encryption.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 5-14. DOI: 10.5220/0003969400050014

@conference{secrypt12,
author={Michael Brenner. and Henning Perl. and Matthew Smith.},
title={Practical Applications of Homomorphic Encryption},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={5-14},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003969400050014},
isbn={978-989-8565-24-2},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Practical Applications of Homomorphic Encryption
SN - 978-989-8565-24-2
AU - Brenner, M.
AU - Perl, H.
AU - Smith, M.
PY - 2012
SP - 5
EP - 14
DO - 10.5220/0003969400050014

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.