# Homomorphic Encryption

67 %
33 %
Technology

Published on February 27, 2014

Author: SwapnilPatil3

Source: slideshare.net

FUTUR--ISTIC APPROACH TOWARDS DATA SECURITY THROUGH HOMOMORPHIC ENCRYPTION By:Swapnil Patil

CONTENTS • Introduction. • An Analogy. • Algorithm. • A Homomorphic symmetric encryption. • Problems. • Revolutions. • Implementation. • References.

INTRODUCTION • Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on ciphertext and obtain an encrypted result which decrypted matches the result of operations performed on the plaintext. • For instance, one person could add two encrypted numbers and then another person could decrypt the result, without either of them being able to find the value of the individual numbers.

• Earlier there was Somewhat Homomorphic Encryption technique. This encryption used low polynomial degree, which was its big drawback. • In June 2009, “Gentry” proposed the first efficient Fully Homomorphic Encryption technique. It is efficient in the sense that all algorithms run in polynomial time.

An Analogy: Alice’s Jewellery Store • Alice’s workers need to assemble raw materials into jewellery • But Alice is worried about theft How can the workers process the raw materials without having access to them?

• Alice puts materials in locked glove box • For which only she has the key • Workers assemble jewellery in the box • Alice unlocks box to get “results

ALGORITHM • Three procedures: KeyGen, Enc, Dec • (sk,pk)  KeyGen(\$) • Generate random public/secret key-pair • c  Encpk(m) • Encrypt a message with the public key • m  Decsk(c) • Decrypt a ciphertext with the secret key • E.g., RSA: cme mod N, mcd mod N • (N,e) public key, d secret key • Works for MULT gates (mod N) • C*=C1 x C2 x…… XCn=(m1 X m2 X…..X mn)(mod N)

THE ANALOGY • Enc: putting things inside the box • Anyone can do this (imagine a mail-drop) • ci  Encpk(mi) • Dec: Taking things out of the box • Only Alice can do it, requires the key • m*  Decsk(c*) • Eval: Assembling the jewelry • Anyone can do it, computing on ciphertext • c*  Evalpk( , c1,…,cn) • m* = (m1,…,mn) is “the ring”, made from “raw materials” m1,…,mn

A HOMOMORPHIC SYMMETRIC ENCRYPTION • Shared secret key: odd number p • To encrypt a bit m: • Choose at random large q, small r 5 • We choose r ~ 2n, p ~ 22n (and q ~ 2n ) • Output c = pq + 2r + m • Ciphertext is close to a multiple of p • To decrypt c: • Output m = (c mod p) mod 2 2r+m much smaller than p

FROM “SOMEWHAT” TO “FULLY” • Theorem [Gentry’09]: Convert “bootstrappable” → FHE. FHE = Can eval all fns. Augmented Decryption ckt. “Bootstrappable” NAND Dec c1 sk Dec c2 sk

PROBLEMS • Ciphertext grows with each operation • Noise grows with each operation • Threat for increasing cybercrimes through encrypted malwares

REVOLUTIONS …. • Wireless Sensor/Mesh Network. • Obfuscation Technology. • IBM HELib.

IMPLEMENTATION…… • Example 1: Private Search • You: Encrypt the query, send to Google (Google does not know the key, cannot “see” the query) • Private search: Encrypted query------- Encrypted Result • You: Decrypt Query , Recover the search result

IMPLEMENTATION…… • Private Cloud Computing Encrypt x input: x program: P Enc(x), P → Enc(P(x))

REFERENCES…. • IEEE XPLORE • Wikipedia.org • Securityexplore.com • Handbook of applied cryptography by Alfred j. Menezes • Webcrawler.com • www.scmagazineuk.com

 User name: Comment:

## Related presentations

#### Neuquén y el Gobierno Abierto

October 30, 2014

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

#### Decision CAMP 2014 - Erik Marutian - Using rules-b...

October 16, 2014

In this presentation we will describe our experience developing with a highly dyna...

#### Schema.org: What It Means For You and Your Library

November 7, 2014

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

#### WearableTech: Una transformación social de los p...

November 3, 2014

Un recorrido por los cambios que nos generará el wearabletech en el futuro

#### O Impacto de Wearable Computers na vida das pessoa...

November 5, 2014

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

#### All you need to know about the Microsoft Band

November 6, 2014

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

## Related pages

### Homomorphic encryption - Wikipedia, the free encyclopedia

Homomorphic encryption is a form of encryption that allows computations to be carried out on ciphertext, thus generating an encrypted result which, when ...

### Homomorphic Encryption - MIT Technology Review

Ciphering: Gentry’s system allows encrypted data to be analyzed in the cloud. In this example, we wish to add 1 and 2. The data is encrypted so that 1 ...

### Homomorphic Encryption - Schneier on Security

derp • September 25, 2012 8:33 AM. cryptDB prototype by MIT works pretty well doing homomorphic encryption only problem is it can't do square roots

### What is homomorphic encryption? - Definition from WhatIs.com

Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form. By ...

### Homomorphic encryption - Crypto Wiki - Wikia

Homomorphic encryption is a form of encryption where a specific algebraic operation is performed on the plaintext and another (possibly different ...

### A Fully Homomorphic Encryption Scheme - Applied Crypto ...

Abstract We propose the ﬂrst fully homomorphic encryption scheme, solving a central open problem in cryptography. Such a scheme allows one to compute ...

### Cryptography Research - Homomorphic Encryption

C Gentry, S Halevi, Implementing Gentry’s Fully-Homomorphic Encryption Scheme , Advances in Cryptology--EUROCRYPT 2011, Springer. C Gentry, S Halevi, V ...

### Securing the cloud | MIT News

Homomorphic encryption is one of the most exciting new research topics in cryptography, which promises to make cloud computing perfectly secure.