• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Shundong, Dou Jiawei, Wang Daoshun. Survey on Homomorphic Encryption and Its Applications to Cloud Security[J]. Journal of Computer Research and Development, 2015, 52(6): 1378-1388. DOI: 10.7544/issn1000-1239.2015.20131494
Citation: Li Shundong, Dou Jiawei, Wang Daoshun. Survey on Homomorphic Encryption and Its Applications to Cloud Security[J]. Journal of Computer Research and Development, 2015, 52(6): 1378-1388. DOI: 10.7544/issn1000-1239.2015.20131494

Survey on Homomorphic Encryption and Its Applications to Cloud Security

More Information
  • Published Date: May 31, 2015
  • Cloud service mode has great economical and technical advantages and wide application prospects. The popularization of the cloud service is significant to both the informationization and the development of China. Cloud security is the most serious challenge in the generalization and the applications of the cloud service. Homomorphic encryption schemes, especially fully ones, are the most important technology to solve the security problem arising in cloud service, and a focus in the international cryptographic community. In this paper, we summarize the state of the art of the homomorphic encryption research, introduce the applications of the homomorphic encryption to the protection of the data confidentiality in cloud computing and to other fields, analyze the merits and the faults of various algebraic somewhat homomorphic encryption schemes and of fully homomorphic encryption schemes based on circuits, point out some open problems and new directions in the fully homomorphic encryption research, and briefly introduce the concept of secure plaintext computing, its advantages over cipher-text computing and some problems that need further studying.
  • Related Articles

    [1]Liu Weixin, Guan Yewei, Huo Jiarong, Ding Yuanchao, Guo Hua, Li Bo. A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2024, 61(5): 1218-1229. DOI: 10.7544/issn1000-1239.202330966
    [2]Guo Juanjuan, Wang Qiongxiao, Xu Xin, Wang Tianyu, Lin Jingqiang. Secure Multiparty Computation and Application in Machine Learning[J]. Journal of Computer Research and Development, 2021, 58(10): 2163-2186. DOI: 10.7544/issn1000-1239.2021.20210626
    [3]Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei. Research Advances on Privacy Preserving in Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051. DOI: 10.7544/issn1000-1239.2020.20200614
    [4]Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting. A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383. DOI: 10.7544/issn1000-1239.2019.20190293
    [5]Wu Libing, Zhang Yubo, He Debiao. Dual Server Identity-Based Encryption with Equality Test for Cloud Computing[J]. Journal of Computer Research and Development, 2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446
    [6]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [7]Jiang Han, Xu Qiuliang. Secure Multiparty Computation in Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162. DOI: 10.7544/issn1000-1239.2016.20160685
    [8]Liu Mingjie, Wang An. Fully Homomorphic Encryption and Its Applications[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603. DOI: 10.7544/issn1000-1239.2014.20131168
    [9]Wang Ke and Dai Yiqi. Secure Multiparty Computation of Statistical Distribution[J]. Journal of Computer Research and Development, 2010, 47(2): 201-206.
    [10]Li Shundong, Si Tiange, and Dai Yiqi. Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion[J]. Journal of Computer Research and Development, 2005, 42(10): 1647-1653.

Catalog

    Article views (2117) PDF downloads (3264) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return