HOME

TheInfoList



OR:

Homomorphic encryption is a form of
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
that permits users to perform computations on its encrypted data without first decrypting it. These resulting computations are left in an encrypted form which, when decrypted, result in an identical output to that produced had the operations been performed on the unencrypted data. Homomorphic encryption can be used for privacy-preserving outsourced storage and
computation Computation is any type of arithmetic or non-arithmetic calculation that follows a well-defined model (e.g., an algorithm). Mechanical or electronic devices (or, historically, people) that perform computations are known as ''computers''. An es ...
. This allows data to be encrypted and out-sourced to commercial cloud environments for processing, all while encrypted. For sensitive data, such as health care information, homomorphic encryption can be used to enable new services by removing privacy barriers inhibiting data sharing or increase security to existing services. For example,
predictive analytics Predictive analytics encompasses a variety of statistical techniques from data mining, predictive modeling, and machine learning that analyze current and historical facts to make predictions about future or otherwise unknown events. In busine ...
in health care can be hard to apply via a third party service provider due to medical data privacy concerns, but if the predictive analytics service provider can operate on encrypted data instead, these privacy concerns are diminished. Moreover, even if the service provider's system is compromised, the data would remain secure.


Description

Homomorphic encryption is a form of
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
with an additional evaluation capability for computing over encrypted data without access to the
secret key A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key ...
. The result of such a computation remains encrypted. Homomorphic encryption can be viewed as an extension of
public-key cryptography Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
. ''Homomorphic'' refers to
homomorphism In algebra, a homomorphism is a structure-preserving map between two algebraic structures of the same type (such as two groups, two rings, or two vector spaces). The word ''homomorphism'' comes from the Ancient Greek language: () meaning "same" ...
in algebra: the encryption and decryption functions can be thought of as homomorphisms between plaintext and ciphertext spaces. Homomorphic encryption includes multiple types of encryption schemes that can perform different classes of computations over encrypted data. The computations are represented as either Boolean or arithmetic circuits. Some common types of homomorphic encryption are ''partially'' homomorphic, ''somewhat'' homomorphic, ''leveled'' ''fully'' homomorphic, and ''fully'' homomorphic encryption: * ''Partially homomorphic encryption'' encompasses schemes that support the evaluation of circuits consisting of only one type of gate, e.g., addition or multiplication. * ''Somewhat homomorphic encryption'' schemes can evaluate two types of gates, but only for a subset of circuits. * ''Leveled fully homomorphic encryption'' supports the evaluation of arbitrary circuits composed of multiple types of gates of bounded (pre-determined) depth. * ''Fully homomorphic encryption'' (FHE) allows the evaluation of arbitrary circuits composed of multiple types of gates of unbounded depth and is the strongest notion of homomorphic encryption. For the majority of homomorphic encryption schemes, the multiplicative depth of circuits is the main practical limitation in performing computations over encrypted data. Homomorphic encryption schemes are inherently
malleable Ductility is a mechanical property commonly described as a material's amenability to drawing (e.g. into wire). In materials science, ductility is defined by the degree to which a material can sustain plastic deformation under tensile stres ...
. In terms of malleability, homomorphic encryption schemes have weaker security properties than non-homomorphic schemes.


History

Homomorphic encryption schemes have been developed using different approaches. Specifically, fully homomorphic encryption schemes are often grouped into generations corresponding to the underlying approach.


Pre-FHE

The problem of constructing a fully homomorphic encryption scheme was first proposed in 1978, within a year of publishing of the RSA scheme. For more than 30 years, it was unclear whether a solution existed. During that period, partial results included the following schemes: * RSA cryptosystem (unbounded number of modular multiplications) * ElGamal cryptosystem (unbounded number of modular multiplications) *
Goldwasser–Micali cryptosystem The Goldwasser–Micali (GM) cryptosystem is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction of being the first probabilistic public-key encryption scheme which is provably ...
(unbounded number of
exclusive or Exclusive or or exclusive disjunction is a logical operation that is true if and only if its arguments differ (one is true, the other is false). It is symbolized by the prefix operator J and by the infix operators XOR ( or ), EOR, EXOR, , ...
operations) *
Benaloh cryptosystem The Benaloh Cryptosystem is an extension of the Goldwasser-Micali cryptosystem (GM) created in 1985 by Josh (Cohen) Benaloh. The main improvement of the Benaloh Cryptosystem over GM is that longer blocks of data can be encrypted at once, whereas i ...
(unbounded number of modular additions) *
Paillier cryptosystem The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing ''n''-th residue classes is believed to be computationally difficult. The ...
(unbounded number of modular additions) * Sander-Young-Yung system (after more than 20 years solved the problem for logarithmic depth circuits) * Boneh–Goh–Nissim cryptosystem (unlimited number of addition operations but at most one multiplication) * Ishai-Paskin cryptosystem (polynomial-size branching programs)


First-generation FHE

Craig Gentry Craig Alan Gentry (born November 29, 1983) is an American former professional baseball outfielder. He played in Major League Baseball (MLB) for the Texas Rangers, Oakland Athletics, Los Angeles Angels and Baltimore Orioles. Baseball career ...
, using
lattice-based cryptography Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself or in the security proof. Lattice-based constructions are currently important candidates for pos ...
, described the first plausible construction for a fully homomorphic encryption scheme. Gentry's scheme supports both addition and multiplication operations on ciphertexts, from which it is possible to construct circuits for performing arbitrary computation. The construction starts from a ''somewhat homomorphic'' encryption scheme, which is limited to evaluating low-degree polynomials over encrypted data; it is limited because each ciphertext is noisy in some sense, and this noise grows as one adds and multiplies ciphertexts, until ultimately the noise makes the resulting ciphertext indecipherable. Gentry then shows how to slightly modify this scheme to make it ''bootstrappable'', i.e., capable of evaluating its own decryption circuit and then at least one more operation. Finally, he shows that any bootstrappable somewhat homomorphic encryption scheme can be converted into a fully homomorphic encryption through a recursive self-embedding. For Gentry's "noisy" scheme, the bootstrapping procedure effectively "refreshes" the ciphertext by applying to it the decryption procedure homomorphically, thereby obtaining a new ciphertext that encrypts the same value as before but has lower noise. By "refreshing" the ciphertext periodically whenever the noise grows too large, it is possible to compute an arbitrary number of additions and multiplications without increasing the noise too much. Gentry based the security of his scheme on the assumed hardness of two problems: certain worst-case problems over ideal lattices, and the sparse (or low-weight) subset sum problem. Gentry's Ph.D. thesis provides additional details. The Gentry-Halevi implementation of Gentry's original cryptosystem reported timing of about 30 minutes per basic bit operation. Extensive design and implementation work in subsequent years have improved upon these early implementations by many orders of magnitude runtime performance. In 2010, Marten van Dijk,
Craig Gentry Craig Alan Gentry (born November 29, 1983) is an American former professional baseball outfielder. He played in Major League Baseball (MLB) for the Texas Rangers, Oakland Athletics, Los Angeles Angels and Baltimore Orioles. Baseball career ...
,
Shai Halevi Shai Halevi ( he, שי הלוי; born 1966) is a computer scientist who works on cryptography research at Algorand Foundation, a blockchain startup founded by Silvio Micali. Born in Israel in 1966, Halevi received a B.A. and M.Sc. in computer sc ...
and Vinod Vaikuntanathan presented a second fully homomorphic encryption scheme, which uses many of the tools of Gentry's construction, but which does not require ideal lattices. Instead, they show that the somewhat homomorphic component of Gentry's ideal lattice-based scheme can be replaced with a very simple somewhat homomorphic scheme that uses integers. The scheme is therefore conceptually simpler than Gentry's ideal lattice scheme, but has similar properties with regards to homomorphic operations and efficiency. The somewhat homomorphic component in the work of Van Dijk et al. is similar to an encryption scheme proposed by Levieil and Naccache in 2008, and also to one that was proposed by
Bram Cohen Bram Cohen is an American computer programmer, best known as the author of the peer-to-peer (P2P) BitTorrent protocol in 2001, as well as the first file sharing program to use the protocol, also known as BitTorrent. He is also the co-founder of ...
in 1998. Cohen's method is not even additively homomorphic, however. The Levieil–Naccache scheme supports only additions, but it can be modified to also support a small number of multiplications. Many refinements and optimizations of the scheme of Van Dijk et al. were proposed in a sequence of works by Jean-Sébastien Coron, Tancrède Lepoint, Avradip Mandal,
David Naccache David Naccache is a cryptographer, currently a professor at the École normale supérieure and a member of its Computer Laboratory. He was previously a professor at Panthéon-Assas University. Biography He received his Ph.D. in 1995 from the à ...
, and Mehdi Tibouchi. Some of these works included also implementations of the resulting schemes.


Second-generation FHE

The homomorphic cryptosystems of this generation are derived from techniques that were developed starting in 2011-2012 by Zvika Brakerski,
Craig Gentry Craig Alan Gentry (born November 29, 1983) is an American former professional baseball outfielder. He played in Major League Baseball (MLB) for the Texas Rangers, Oakland Athletics, Los Angeles Angels and Baltimore Orioles. Baseball career ...
, Vinod Vaikuntanathan, and others. These innovations led to the development of much more efficient somewhat and fully homomorphic cryptosystems. These include: * The Brakerski-Gentry-Vaikuntanathan (BGV, 2011) scheme,Z. Brakerski, C. Gentry, and V. Vaikuntanathan
Fully Homomorphic Encryption without Bootstrapping
In ''ITCS 2012''
building on techniques of Brakerski-Vaikuntanathan;Z. Brakerski and V. Vaikuntanathan
Efficient Fully Homomorphic Encryption from (Standard) LWE
In ''FOCS 2011'' (IEEE)
* The
NTRU NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures. Unli ...
-based scheme by Lopez-Alt, Tromer, and Vaikuntanathan (LTV, 2012);A. Lopez-Alt, E. Tromer, and V. Vaikuntanathan
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
In ''STOC 2012'' (ACM)
* The Brakerski/Fan-Vercauteren (BFV, 2012) scheme, building on Brakerski's cryptosystem;Z. Brakerski
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
In ''CRYPTO 2012'' (Springer)
* The
NTRU NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures. Unli ...
-based scheme by Bos, Lauter, Loftus, and Naehrig (BLLN, 2013),J. Bos, K. Lauter, J. Loftus, and M. Naehrig
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
In ''IMACC 2013'' (Springer)
building on LTV and Brakerski's scale-invariant cryptosystem; The security of most of these schemes is based on the hardness of the (Ring) Learning With Errors (RLWE) problem, except for the LTV and BLLN schemes that rely on an ''overstretched''M. Albrecht, S. Bai, and L. Ducas
A subfield lattice attack on overstretched NTRU assumptions
In ''CRYPTO 2016'' (Springer)
variant of the
NTRU NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures. Unli ...
computational problem. This NTRU variant was subsequently shown vulnerable to subfield lattice attacks, which is why these two schemes are no longer used in practice. All the second-generation cryptosystems still follow the basic blueprint of Gentry's original construction, namely they first construct a somewhat homomorphic cryptosystem and then convert it to a fully homomorphic cryptosystem using bootstrapping. A distinguishing characteristic of the second-generation cryptosystems is that they all feature a much slower growth of the noise during the homomorphic computations. Additional optimizations by
Craig Gentry Craig Alan Gentry (born November 29, 1983) is an American former professional baseball outfielder. He played in Major League Baseball (MLB) for the Texas Rangers, Oakland Athletics, Los Angeles Angels and Baltimore Orioles. Baseball career ...
,
Shai Halevi Shai Halevi ( he, שי הלוי; born 1966) is a computer scientist who works on cryptography research at Algorand Foundation, a blockchain startup founded by Silvio Micali. Born in Israel in 1966, Halevi received a B.A. and M.Sc. in computer sc ...
, and
Nigel Smart Nigel James Smart (born 21 May 1969) is a former Australian rules footballer who played for the Adelaide Football Club in the Australian Football League (AFL). Smart played most of his career in defence and became a crowd favourite, easily ...
resulted in cryptosystems with nearly optimal asymptotic complexity: Performing T operations on data encrypted with security parameter k has complexity of only T\cdot\mathrm(k).C. Gentry, S. Halevi, and N. P. Smart
Fully Homomorphic Encryption with Polylog Overhead
In ''EUROCRYPT 2012'' (Springer)
C. Gentry, S. Halevi, and N. P. Smart
Better Bootstrapping in Fully Homomorphic Encryption
In ''PKC 2012'' (SpringeR)
C. Gentry, S. Halevi, and N. P. Smart
Homomorphic Evaluation of the AES Circuit
In ''CRYPTO 2012'' (Springer)
These optimizations build on the Smart-Vercauteren techniques that enables packing of many plaintext values in a single ciphertext and operating on all these plaintext values in a
SIMD Single instruction, multiple data (SIMD) is a type of parallel processing in Flynn's taxonomy. SIMD can be internal (part of the hardware design) and it can be directly accessible through an instruction set architecture (ISA), but it shoul ...
fashion. Many of the advances in these second-generation cryptosystems were also ported to the cryptosystem over the integers. Another distinguishing feature of second-generation schemes is that they are efficient enough for many applications even without invoking bootstrapping, instead operating in the leveled FHE mode.


Third-generation FHE

In 2013,
Craig Gentry Craig Alan Gentry (born November 29, 1983) is an American former professional baseball outfielder. He played in Major League Baseball (MLB) for the Texas Rangers, Oakland Athletics, Los Angeles Angels and Baltimore Orioles. Baseball career ...
,
Amit Sahai Amit Sahai (born 1974) is an American computer scientist. He is a professor of computer science at UCLA and the director of the Center for Encrypted Functionalities. Biography Amit Sahai was born in 1974 in Thousand Oaks, California, to parents wh ...
, and
Brent Waters Brent R. Waters is an American computer scientist, specializing in cryptography and computer security. He is currently a professor of Computer Science at the University of Texas at Austin. Career Waters attended the University of California, Los ...
(GSW) proposed a new technique for building FHE schemes that avoids an expensive "relinearization" step in homomorphic multiplication.C. Gentry, A. Sahai, and B. Waters
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
In ''CRYPTO 2013'' (Springer)
Zvika Brakerski and Vinod Vaikuntanathan observed that for certain types of circuits, the GSW cryptosystem features an even slower growth rate of noise, and hence better efficiency and stronger security. Jacob Alperin-Sheriff and Chris Peikert then described a very efficient bootstrapping technique based on this observation.J. Alperin-Sheriff and C. Peikert
Faster Bootstrapping with Polynomial Error
In ''CRYPTO 2014'' (Springer)
These techniques were further improved to develop efficient ring variants of the GSW cryptosystem: FHEW (2014) and TFHE (2016). The FHEW scheme was the first to show that by refreshing the ciphertexts after every single operation, it is possible to reduce the bootstrapping time to a fraction of a second. FHEW introduced a new method to compute Boolean gates on encrypted data that greatly simplifies bootstrapping and implemented a variant of the bootstrapping procedure. The efficiency of FHEW was further improved by the TFHE scheme, which implements a ring variant of the bootstrapping procedureN. Gama, M. Izabachène, P.Q. Nguyen, and X. Xi
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
In ''EUROCRYPT 2016'' (Springer)
using a method similar to the one in FHEW.


Fourth-generation FHE

In 2016, Cheon, Kim, Kim and Song (CKKS) proposed an approximate homomorphic encryption scheme that supports a special kind of fixed-point arithmetic that is commonly referred to as
block floating point Block floating point (BFP) is a method used to provide an arithmetic approaching floating point while using a fixed-point processor. BFP assigns a group of ''significands'' (the non-exponent part of the floating-point number) to a single exponent, ...
arithmetic. The CKKS scheme includes an efficient rescaling operation that scales down an encrypted message after a multiplication. For comparison, such rescaling requires bootstrapping in the BGV and BFV schemes. The rescaling operation makes CKKS scheme the most efficient method for evaluating polynomial approximations, and is the preferred approach for implementin
privacy-preserving machine learning applications
The scheme introduces several approximation errors, both nondeterministic and deterministic, that require special handling in practice.Kim A., Papadimitriou A., Polyakov Y
Approximate Homomorphic Encryption with Reduced Approximation Error
In ''CT-RSA 2022'' (Springer)
A 2020 article by Baiyu Li and Daniele Micciancio discusses passive attacks against CKKS, suggesting that the standard IND-CPA definition may not be sufficient in scenarios where decryption results are shared. The authors apply the attack to four modern homomorphic encryption libraries (HEAAN, SEAL, HElib and PALISADE) and report that it is possible to recover the secret key from decryption results in several parameter configurations. The authors also propose mitigation strategies for these attacks, and include a Responsible Disclosure in the paper suggesting that the homomorphic encryption libraries already implemented mitigations for the attacks before the article became publicly available. Further information on the mitigation strategies implemented in the homomorphic encryption libraries has also been published.


Partially homomorphic cryptosystems

In the following examples, the notation \mathcal(x) is used to denote the encryption of the message x. Unpadded RSA If the RSA public key has modulus n and encryption exponent e, then the encryption of a message m is given by \mathcal(m) = m^e \;\bmod\; n. The homomorphic property is then : \begin \mathcal(m_1) \cdot \mathcal(m_2) &= m_1^e m_2^e \;\bmod\; n \\ pt&= (m_1 m_2)^e \;\bmod\; n \\ pt&= \mathcal(m_1 \cdot m_2) \end ElGamal In the ElGamal cryptosystem, in a cyclic group G of order q with generator g, if the public key is (G, q, g, h), where h = g^x, and x is the secret key, then the encryption of a message m is \mathcal(m) = (g^r,m\cdot h^r), for some random r \in \. The homomorphic property is then : \begin \mathcal(m_1) \cdot \mathcal(m_2) &= (g^,m_1\cdot h^)(g^,m_2 \cdot h^) \\ pt&= (g^,(m_1\cdot m_2) h^) \\ pt&= \mathcal(m_1 \cdot m_2). \end Goldwasser–Micali In the
Goldwasser–Micali cryptosystem The Goldwasser–Micali (GM) cryptosystem is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction of being the first probabilistic public-key encryption scheme which is provably ...
, if the public key is the modulus n and quadratic non-residue x, then the encryption of a bit b is \mathcal(b) = x^b r^2 \;\bmod\; n, for some random r \in \. The homomorphic property is then : \begin \mathcal(b_1)\cdot \mathcal(b_2) &= x^ r_1^2 x^ r_2^2 \;\bmod\; n \\ pt&= x^ (r_1r_2)^2 \;\bmod\; n \\ pt&= \mathcal(b_1 \oplus b_2). \end where \oplus denotes addition modulo 2, (i.e.,
exclusive-or Exclusive or or exclusive disjunction is a logical operation that is true if and only if its arguments differ (one is true, the other is false). It is symbolized by the prefix operator J and by the infix operators XOR ( or ), EOR, EXOR, , , ...
). Benaloh In the
Benaloh cryptosystem The Benaloh Cryptosystem is an extension of the Goldwasser-Micali cryptosystem (GM) created in 1985 by Josh (Cohen) Benaloh. The main improvement of the Benaloh Cryptosystem over GM is that longer blocks of data can be encrypted at once, whereas i ...
, if the public key is the modulus n and the base g with a blocksize of c, then the encryption of a message m is \mathcal(m) = g^m r^c \;\bmod\; n, for some random r \in \. The homomorphic property is then : \begin \mathcal(m_1) \cdot \mathcal(m_2) &= (g^ r_1^c)(g^ r_2^c) \;\bmod\; n \\ pt&= g^ (r_1 r_2)^c \;\bmod\; n \\ pt&= \mathcal(m_1 + m_2 \;\bmod\; c). \end Paillier In the
Paillier cryptosystem The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing ''n''-th residue classes is believed to be computationally difficult. The ...
, if the public key is the modulus n and the base g, then the encryption of a message m is \mathcal(m) = g^m r^n \;\bmod\; n^2, for some random r \in \. The homomorphic property is then : \begin \mathcal(m_1) \cdot \mathcal(m_2) &= (g^ r_1^n)(g^ r_2^n) \;\bmod\; n^2 \\ pt&= g^ (r_1r_2)^n \;\bmod\; n^2 \\ pt&= \mathcal(m_1 + m_2). \end Other partially homomorphic cryptosystems *
Okamoto–Uchiyama cryptosystem The Okamoto–Uchiyama cryptosystem is a public key cryptosystem proposed in 1998 by Tatsuaki Okamoto and Shigenori Uchiyama. The system works in the multiplicative group of integers modulo n, (\mathbb/n\mathbb)^*, where ''n'' is of the form ''p' ...
*
Naccache–Stern cryptosystem The Naccache–Stern cryptosystem is a homomorphic public-key cryptosystem whose security rests on the higher residuosity problem. The Naccache–Stern cryptosystem was discovered by David Naccache and Jacques Stern in 1998. Scheme Definition L ...
*
Damgård–Jurik cryptosystem The Damgård–Jurik cryptosystemIvan Damgård, Mads JurikA Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System Public Key Cryptography 2001: 119-136 is a generalization of the Paillier cryptosystem. ...
*Sander–Young–Yung encryption scheme *Boneh–Goh–Nissim cryptosystem *Ishai–Paskin cryptosystem *Joye-Libert cryptosystem *Castagnos–Laguillaumie cryptosystem


Fully homomorphic encryption

A cryptosystem that supports on ciphertexts is known as fully homomorphic encryption (FHE). Such a scheme enables the construction of programs for any desirable functionality, which can be run on encrypted inputs to produce an encryption of the result. Since such a program need never decrypt its inputs, it can be run by an untrusted party without revealing its inputs and internal state. Fully homomorphic cryptosystems have great practical implications in the outsourcing of private computations, for instance, in the context of
cloud computing Cloud computing is the on-demand availability of computer system resources, especially data storage ( cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over mul ...
.


Implementations

A list of open-source FHE libraries implementing second-generation (BGV/BFV), third-generation (FHEW/TFHE), and/or fourth-generation (CKKS) FHE schemes is provided below. There are several open-source implementations of fully homomorphic encryption schemes. Second-generation and fourth-generation FHE scheme implementations typically operate in the leveled FHE mode (though bootstrapping is still available in some libraries) and support efficient
SIMD Single instruction, multiple data (SIMD) is a type of parallel processing in Flynn's taxonomy. SIMD can be internal (part of the hardware design) and it can be directly accessible through an instruction set architecture (ISA), but it shoul ...
-like packing of data; they are typically used to compute on encrypted integers or real/complex numbers. Third-generation FHE scheme implementations often bootstrap after each operation but have limited support for packing; they were initially used to compute Boolean circuits over encrypted bits, but have been extended to support integer arithmetics and univariate function evaluation. The choice of using a second-generation vs. third-generation vs fourth-generation scheme depends on the input data types and the desired computation.


Standardization

In 2017, researchers from IBM,
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
,
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 seri ...
, the NIST, and others formed an open consortium, the Homomorphic Encryption Standardization Consortiu
(Homomorphicencryption.org)
that maintains a community security
Homomorphic Encryption Standard In algebra, a homomorphism is a structure-preserving map between two algebraic structures of the same type (such as two groups, two rings, or two vector spaces). The word ''homomorphism'' comes from the Ancient Greek language: () meaning "same" ...
(The Standard).


See also

* Homomorphic secret sharing * Homomorphic signatures for network coding *
Private biometrics Private biometrics is a form of encrypted biometrics, also called privacy-preserving biometric authentication methods, in which the biometric payload is a one-way, homomorphically encrypted feature vector that is 0.05% the size of the original bio ...
* Verifiable computing using a fully homomorphic scheme *
Client-side encryption Client-side encryption is the cryptographic technique of encrypting data on the sender's side, before it is transmitted to a server such as a cloud storage service. Client-side encryption features an encryption key that is not available to the servi ...
* Searchable symmetric encryption *
Secure multi-party computation Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their ...
*
Format-preserving encryption In cryptography, format-preserving encryption (FPE), refers to encrypting in such a way that the output (the ciphertext) is in the same format as the input (the plaintext). The meaning of "format" varies. Typically only finite sets of characters ar ...
*
Polymorphic code In computing, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact - that is, the ''code'' changes itself every time it runs, but the ''function'' of the code (its semantics) will not chang ...
*
Private set intersection Private set intersection is a secure multiparty computation Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography with the goal of creating ...


References


External links


FHE.org Community (conference, meetup and discussion group)




* *
list of homomorphic encryption implementations
maintained on
GitHub GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, continuous ...
{{DEFAULTSORT:Homomorphic Encryption Homomorphic encryption Cryptographic primitives Public-key cryptography Information privacy