A Review of Homomorphic Encryption and its Applications

Lifang Zhang, Yan Zheng, Raimo Kantola

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    16 Citations (Scopus)

    Abstract

    Homomorphic Encryption (HE) enables meaningful computations on encrypted data without decrypting it. Thus, privacy concerns can be addressed in a satisfactory manner by encrypting data using the homomorphic cryptosystem before uploading the data to a cloud service provider. Recent years have witnessed rapid progress of (HE) development in theory and practice. However, current literature still lacks a thorough review on these new developments and their applications. This paper guides the reader through a journey of these developments by reviewing the state of the art of homomorphic cryptosystems and discussing their advantages, disadvantages as well as applicability. In addition, this work presents the privacy preserving applications of homomorphic cryptosystems in the field of private information retrieval, genomic data, cloud computing and participatory sensing. Moreover, this review further discusses open issues of such applications and future research trends.
    Original languageEnglish
    Title of host publication9th EAI International Conference on Mobile Multimedia Communications, MobiMedia2016
    PublisherACM
    Pages97-106
    Number of pages10
    ISBN (Electronic)978-1-63190-104-1
    DOIs
    Publication statusPublished - Dec 2016
    MoE publication typeA4 Conference publication
    EventEAI International Conference on Mobile Multimedia Communications - TangCheng Hotel , Xi'an, China
    Duration: 18 Jun 201619 Jun 2016
    Conference number: 9

    Conference

    ConferenceEAI International Conference on Mobile Multimedia Communications
    Abbreviated titleMobiMedia
    Country/TerritoryChina
    CityXi'an
    Period18/06/201619/06/2016

    Keywords

    • cryptography
    • homomorphic encryption
    • privacy

    Fingerprint

    Dive into the research topics of 'A Review of Homomorphic Encryption and its Applications'. Together they form a unique fingerprint.

    Cite this