An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications
With the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Illegal intrusion of attackers into the network laye...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-12-01
|
Series: | Mathematics |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-7390/10/24/4678 |
_version_ | 1827637994162487296 |
---|---|
author | Minghao Yuan Dongdong Wang Feng Zhang Shenqing Wang Shan Ji Yongjun Ren |
author_facet | Minghao Yuan Dongdong Wang Feng Zhang Shenqing Wang Shan Ji Yongjun Ren |
author_sort | Minghao Yuan |
collection | DOAJ |
description | With the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Illegal intrusion of attackers into the network layer disrupts the availability of data. The untrusted transmission environment increases the difficulty of users sharing private data, and various outsourced computing and application requirements bring the risk of privacy leakage. Multi-key fully homomorphic encryption (MKFHE) realizes operations between ciphertexts under different key encryption and has great application potential. Since 2012, the first MKFHE scheme LTV12 has been extended from fully homomorphic encryption (FHE) and has ignited the enthusiasm of many cryptographic researchers due to its lattice-based security and quantum-resistant properties. According to its corresponding FHE scheme, the MKFHE schemes can be divided into four kinds: Gentry–Sahai–Water (GSW), number theory research unit (NTRU), Brakerski–Gentry–Vaikuntanathan (BGV), and FHE over the tour (TFHE). Efficiency and cost are urgent issues for MKFHE. New schemes are mainly improved versions of existing schemes. The improvements are mostly related to the four parts of MKFHE: security assumption, key generation, plaintext encryption, and ciphertext processing. We classified MKFHE schemes according to the improved partial schemes, and we present some improved techniques and the applications of MKFHE. |
first_indexed | 2024-03-09T16:08:29Z |
format | Article |
id | doaj.art-d57efadde4ad4afa95b39cfad2d7446a |
institution | Directory Open Access Journal |
issn | 2227-7390 |
language | English |
last_indexed | 2024-03-09T16:08:29Z |
publishDate | 2022-12-01 |
publisher | MDPI AG |
record_format | Article |
series | Mathematics |
spelling | doaj.art-d57efadde4ad4afa95b39cfad2d7446a2023-11-24T16:27:50ZengMDPI AGMathematics2227-73902022-12-011024467810.3390/math10244678An Examination of Multi-Key Fully Homomorphic Encryption and Its ApplicationsMinghao Yuan0Dongdong Wang1Feng Zhang2Shenqing Wang3Shan Ji4Yongjun Ren5Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, ChinaThe 15th Research Institute of China Electronics Technology Group Corporation, Beijing 100083, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaEngineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, ChinaWith the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Illegal intrusion of attackers into the network layer disrupts the availability of data. The untrusted transmission environment increases the difficulty of users sharing private data, and various outsourced computing and application requirements bring the risk of privacy leakage. Multi-key fully homomorphic encryption (MKFHE) realizes operations between ciphertexts under different key encryption and has great application potential. Since 2012, the first MKFHE scheme LTV12 has been extended from fully homomorphic encryption (FHE) and has ignited the enthusiasm of many cryptographic researchers due to its lattice-based security and quantum-resistant properties. According to its corresponding FHE scheme, the MKFHE schemes can be divided into four kinds: Gentry–Sahai–Water (GSW), number theory research unit (NTRU), Brakerski–Gentry–Vaikuntanathan (BGV), and FHE over the tour (TFHE). Efficiency and cost are urgent issues for MKFHE. New schemes are mainly improved versions of existing schemes. The improvements are mostly related to the four parts of MKFHE: security assumption, key generation, plaintext encryption, and ciphertext processing. We classified MKFHE schemes according to the improved partial schemes, and we present some improved techniques and the applications of MKFHE.https://www.mdpi.com/2227-7390/10/24/4678multi-key fully homomorphic encryptionInternet of Thingsdistributed computingprivacy protection |
spellingShingle | Minghao Yuan Dongdong Wang Feng Zhang Shenqing Wang Shan Ji Yongjun Ren An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications Mathematics multi-key fully homomorphic encryption Internet of Things distributed computing privacy protection |
title | An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications |
title_full | An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications |
title_fullStr | An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications |
title_full_unstemmed | An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications |
title_short | An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications |
title_sort | examination of multi key fully homomorphic encryption and its applications |
topic | multi-key fully homomorphic encryption Internet of Things distributed computing privacy protection |
url | https://www.mdpi.com/2227-7390/10/24/4678 |
work_keys_str_mv | AT minghaoyuan anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications AT dongdongwang anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications AT fengzhang anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications AT shenqingwang anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications AT shanji anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications AT yongjunren anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications AT minghaoyuan examinationofmultikeyfullyhomomorphicencryptionanditsapplications AT dongdongwang examinationofmultikeyfullyhomomorphicencryptionanditsapplications AT fengzhang examinationofmultikeyfullyhomomorphicencryptionanditsapplications AT shenqingwang examinationofmultikeyfullyhomomorphicencryptionanditsapplications AT shanji examinationofmultikeyfullyhomomorphicencryptionanditsapplications AT yongjunren examinationofmultikeyfullyhomomorphicencryptionanditsapplications |