2016
DOI: 10.14445/23488387/ijcse-v3i2p104
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Fully Homomorphic Encryption in Security - A Survey

Abstract: Many conventional cryptographic systems have homomorphic properties, yet there was no need of homomorphisms and little attention was paid to it. The ability to process encrypted data led to a renewed interest in Homomorphisms and a new cryptographic primitive, Fully Homomorphic Encryption (FHE) emerged. With time, question arose as to whether FHE is possible or not which has now modified as whether FHE is applicable or not. This paper provides a brief survey focusing on the development of HE to FHE and discuss… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…Symmetric Encryption and Asymmetric Encryption Algorithm: Symmetric encryption refers to the encryption technique of encryption and decryption the use of the equal key, whether or not it is encryption or decryption, the equal key is used [14]. Common symmetric encryption algorithms consist of DES (Data Encryption Standard), 3DES (Triple Data Encryption Algorithm), AES (Advanced Encryption Standard), etc.…”
Section: The Introduction Of Encryption Techniquesmentioning
confidence: 99%
“…Symmetric Encryption and Asymmetric Encryption Algorithm: Symmetric encryption refers to the encryption technique of encryption and decryption the use of the equal key, whether or not it is encryption or decryption, the equal key is used [14]. Common symmetric encryption algorithms consist of DES (Data Encryption Standard), 3DES (Triple Data Encryption Algorithm), AES (Advanced Encryption Standard), etc.…”
Section: The Introduction Of Encryption Techniquesmentioning
confidence: 99%
“…A sector is made up of referencing bases, segmentation message bases, and parity bases [14]. DNA Cryptography introduced after that in many method some these traditional such as genetic algorithm [15,16] and Vigenere Cipher [17], data Encryption Standard (DES), Advanced Encryption Standard (AES), and Blowfish are examples of symmetric cryptographic techniques [18], and asymmetric key cryptographic algorithms like Rivest-Shamir-Aldeman RSA [19], but other encryption based on biological technologies such as DNA chips and Polymerase Chain Reaction PCR amplification [20][21][22], DNA Encryption Dependent on DNA Arithmetic and Biomedical Processes is a strategy for encrypting DNA [23]. Bimolecular cryptography emerged as field for data encryption which exploiting specific biomolecular interactions as a unique approach for information security [24].…”
Section: Introductionmentioning
confidence: 99%