Review of how to construct a fully homomorphic encryption scheme

9Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

Fully homomorphic encryption (FHE) allows one to perform arbitrary computation on encrypted data. From the cloud computing perspective, a FHE scheme can be used to outsource a computation to a remote cloud server without revealing the computed data to the server. This is a very attractive cryptographic primitive. Existing methods used to construct FHE schemes are complicated, and often these methods are difficult to understand except by experts in the field. This paper aims to explain how to construct a FHE scheme in an easily understandable way. We first present a general overview of FHE scheme construction. We then take the van Dijk et al FHE scheme as an example and explain how a FHE scheme is obtained from a simple integer-based encryption scheme. Our explanation gives details of the noise bound, how noise growth can be controlled and how the vanDijk scheme is implemented. © 2014 SERSC International Journal of Security and Its Applications.

Cite

CITATION STYLE

APA

Zhi-gang, C., Jian, W., Liqun, C., & Xin-xia, S. (2014). Review of how to construct a fully homomorphic encryption scheme. International Journal of Security and Its Applications, 8(2), 221–230. https://doi.org/10.14257/ijsia.2014.8.2.23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free