Abstract

Encryption is the process of disguising text to ensure the confidentiality of data transmitted from one party to another. Homomorphic encryption is one of the most important encryption-related processes which allows performing operation over encrypted data. Using different public key algorithms, homo-morphic encryption can be implemented in any scheme. There are many encryption algorithms to secure operations and data stor-age, which after calculations can obtain the same results. While there is a considerable contribution and enhancement in the field of homomorphic encryption for various performance metrics, there is still an necessity to clarify the applications dealing with this technology. Recently, many distinguished research papers have been filed to address the need for various applications of homomorphic encryption. Recently, many distinguished research papers have been filed to address the need for various applications of homomorphic encryption. Example of these applications but not limited to : Vehicle to Vehicle (v2v) secure communication, cloud security, Vehicular ad-hoc networks (VANET), Blockchain, E-Voting, Data mining with privacy preserving and healthcare sector. This article aims to introduce a literature survey to close the gap in homomorphic encryption systems and their applications in the protection of privacy. We focus on above-mentioned applications and present our recommendations for future work.

Highlights

  • Over one billion devices are connected to the Internet and this number will continue to grow

  • The concept of homomorphic encryption (HE) can be explained metaphorically by using the jewelery shop example: Alice owns the jewelery shop and she does not trust her workers with her jewelery, so, she gets an impenetrable box, hands it off to someone only by using special gloves, and she is the only one who locks it

  • When Alice wants to make a new piece of jewelery, she locks the materials inside the box

Read more

Summary

Introduction

Over one billion devices are connected to the Internet and this number will continue to grow. Data can be stored in an encrypted format; it must be decrypted before being processed. This can make the data vulnerable and susceptible to attack. The homomorphic encryption used in untrusted third parties provides privacy and security for data processing and it offers effective data protection and solves important privacy issues. Once the work is finished, Alice opens the box with her key and takes out the finished jewelry. This way, the workers produce the jewelery from raw materials without every truly accessing it themselves. In terms of homomorphic encryption, HE is the impenetrable box and the key to the jewelery box is like ciphering the data. The remainder of this paper consists of surveying the homomorphic encryption is Section 2, the classification of HE in Section 3, and discusses the homomorphic application is Section 4

Objectives
Methods
Findings
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call