• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Mingjie, Wang An. Fully Homomorphic Encryption and Its Applications[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603. DOI: 10.7544/issn1000-1239.2014.20131168
Citation: Liu Mingjie, Wang An. Fully Homomorphic Encryption and Its Applications[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603. DOI: 10.7544/issn1000-1239.2014.20131168

Fully Homomorphic Encryption and Its Applications

More Information
  • Published Date: November 30, 2014
  • With the development of Internet, especially, the occurrence of the concept of cloud computing, there is an increasing demand for the search and process of encrypted data, which makes the fully homomorphic encryption become more and more important. The concept of fully homomorphic encryption was first introduced by Rivest et al. in 1970s. How to construct such schemes is a hard problem for cryptographers. Until 2009, Gentry presented the first fully homomorphic schemes based on ideal lattice, which is a breakthrough in this field. After that, many cryptographers have done some interesting work which promote the fully homomorphric schemes to be practical in future. Fully homomorphric encryption becomes a very trendy topic in cryptography. This paper discusses the main progress on fully homomorphric schemes including the first homomorphic encryption introduced by Gentry and its optimizations, as well as the fully homorphric schemes based on integer and learning with errors problem (LWE problem). Then, the general application framework of fully homomorphic scheme is provided. Cloud computing, electronic voting and digital watermarking are taken as examples to introduce the significant value of application of fully homomorphric encryption.
  • Related Articles

    [1]Cao Zhenfu. New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development[J]. Journal of Computer Research and Development, 2019, 56(1): 131-137. DOI: 10.7544/issn1000-1239.2019.20180756
    [2]Ke Yan, Zhang Minqing, Su Tingting. A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE[J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322. DOI: 10.7544/issn1000-1239.2016.20160444
    [3]Jiang Han, Xu Qiuliang. Secure Multiparty Computation in Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162. DOI: 10.7544/issn1000-1239.2016.20160685
    [4]Yuan Ying, Wang Cuirong, Wang Cong, Ren Tingting, Liu Bingyu. An Uncompleted Information Game Based Resources Allocation Model for Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(6): 1342-1351. DOI: 10.7544/issn1000-1239.2016.20150062
    [5]Yao Zhiqiang, Xiong Jinbo, Ma Jianfeng, Li Qi, Liu Ximeng. A Secure Electronic Document Self-Destructing Scheme in Cloud Computing[J]. Journal of Computer Research and Development, 2014, 51(7): 1417-1423.
    [6]Wang Yazhe and Feng Dengguo. A Survey of Research on Inter-Domain Authorization Interoperation[J]. Journal of Computer Research and Development, 2010, 47(10): 1673-1689.
    [7]Li Xiaofeng, Feng Dengguo, He Yongzhong. Research on Preprocessing Policies in XACML Admin[J]. Journal of Computer Research and Development, 2007, 44(5): 729-736.
    [8]Lü Xin, Feng Dengguo. Founding Computationally Secure Quantum Cryptography Protocols Based on Bit Commitment[J]. Journal of Computer Research and Development, 2005, 42(11): 1918-1923.
    [9]Long Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(5): 868-876.
    [10]Zhang Xiangfeng and Sun Yufang. Dynamic Enforcement of the Strict Integrity Policy in Biba's Model[J]. Journal of Computer Research and Development, 2005, 42(5): 746-754.

Catalog

    Article views (3487) PDF downloads (4124) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return