GET THE APP

Advanced Homomorphic Encryption Schemes
..

International Journal of Sensor Networks and Data Communications

ISSN: 2090-4886

Open Access

Commentary - (2021) Volume 0, Issue 0

Advanced Homomorphic Encryption Schemes

Anitha Kumari Kumarasamy* and M. Ananyaa
*Correspondence: Anitha Kumari Kumarasamy, Department of Information Technology, PSG College of Technology, Coimbatore, India, Email:
Department of Information Technology, PSG College of Technology, Coimbatore, India

Received: 03-Sep-2021 Published: 24-Sep-2021 , DOI: 10.37421/2090-4886.2021.s2.003
Citation: Kumarasamy, Anitha Kumari and M. Ananyaa.“Advanced Homomorphic Encryption Schemes.” J Sens Netw Data Commun 10 (2021): 003.
Copyright: © 2021 Kumarasamy AK, et al. This is an open-access article distributed under the terms of the creative commons attribution license which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

In recent days most of the industrial firms have been searching for ways to keep their data as secured and protected as possible. They have indulged in research works to find a mechanism that can be simple, convenient and guarantees high level security to large amount of data that is being manipulated every now and then. Among such mechanisms, one mechanism that satisfies all these requirements is Homomorphic Encryption (HE). Homomorphic Encryption schemes facilitate computation on the encrypted data, yielding different output every time is considered as an edge over traditional encryption algorithms. HE schemes ensures integrity and security of data, against threats and violations. Researchers expanded the dimensionality of the homomorphic encryption to another level through Carmichael’s Theorem-Based Homomorphic Encryption (CTHE) scheme and Modified Enhanced Homomorphic Encryption (MEHE) scheme. CTHE and MEHE schemes are reviewed in this article to show its robustness against invasive attacks.

Keywords

Homomorphic encryption • CTHE • MEHE

Description

Data security and privacy acts as the fundamental components for any industry/organization in the current situation where dynamic data processing, monitoring and rapid result analysis is indispensable. Homomorphic encryption schemes are considered to be the most efficient, ideal and adaptative mechanism that satisfies all these core requirements where large amount of operations are performed upon encrypted data [1,2]. Advanced research schemes like Carmichael’s Theorem-Based Homomorphic Encryption (CTHE) and Modified Enhanced Homomorphic Encryption (MEHE) are proven to be unconditionally secure that makes it very difficult for the intruders to decrypt the encrypted data [3]. In addition, these schemes are preferred and suitable for wide range of real-time applications to be deployed in resource constrained environments like edge system due to its less computational complexity and storage overhead [4,5].

CTHE and MEHE schemes

CTHE and MEHE schemes serves the purpose best and proves efficient and secure on the hardness of integer factorization, discrete logarithm, and quadratic residuosity problem that is considered as NP-hard [3]. Modulo switching technique is adopted and proved theoretically to reduce noise in the described schemes. Also, to ensure high randomness in the keys and to distribute the keys effectively between edge system and storage server, quantum random number generator and quantum key distributor serves the purpose. Thus, freshness of the key and forward secrecy is ensured and distribution of key occurs between edge system and storage server. The above-mentioned schemes are tested for a healthcare application to ensure integrity of computation (tamper resistant), data security and record maintenance. Comparative analysis of CTHE and MEHE schemes are performed with the existing schemes such as Dijk-Gentry-Halevi- Vaikutanathan (DGHV) scheme, Paillier scheme and ElGamal scheme and proved its effectiveness in terms of computation, key size, noise reduction, key freshness and suitability for real-world applications [6-8]. Highest potential of the schemes are explored against attack vector space [9].

Conclusion

Technological advancements and Innovations are progressing exponentially in the present era, emphasizing the importance of data security and integrity. CTHE and MEHE schemes well satisfy the core requirements of homomorphic encryption that facilitate computation on the encrypted data with minimal noise. Additional features such as querying and searching upon encrypted data can be incorporated with CTHE and MEHE schemes to showcase the maximum potential.

References

Google Scholar citation report
Citations: 343

International Journal of Sensor Networks and Data Communications received 343 citations as per Google Scholar report

International Journal of Sensor Networks and Data Communications peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward