An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications

With the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Illegal intrusion of attackers into the network laye...

Full description

Bibliographic Details
Main Authors: Minghao Yuan, Dongdong Wang, Feng Zhang, Shenqing Wang, Shan Ji, Yongjun Ren
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Mathematics
Subjects:
Online Access:https://www.mdpi.com/2227-7390/10/24/4678
_version_ 1827637994162487296
author Minghao Yuan
Dongdong Wang
Feng Zhang
Shenqing Wang
Shan Ji
Yongjun Ren
author_facet Minghao Yuan
Dongdong Wang
Feng Zhang
Shenqing Wang
Shan Ji
Yongjun Ren
author_sort Minghao Yuan
collection DOAJ
description With the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Illegal intrusion of attackers into the network layer disrupts the availability of data. The untrusted transmission environment increases the difficulty of users sharing private data, and various outsourced computing and application requirements bring the risk of privacy leakage. Multi-key fully homomorphic encryption (MKFHE) realizes operations between ciphertexts under different key encryption and has great application potential. Since 2012, the first MKFHE scheme LTV12 has been extended from fully homomorphic encryption (FHE) and has ignited the enthusiasm of many cryptographic researchers due to its lattice-based security and quantum-resistant properties. According to its corresponding FHE scheme, the MKFHE schemes can be divided into four kinds: Gentry–Sahai–Water (GSW), number theory research unit (NTRU), Brakerski–Gentry–Vaikuntanathan (BGV), and FHE over the tour (TFHE). Efficiency and cost are urgent issues for MKFHE. New schemes are mainly improved versions of existing schemes. The improvements are mostly related to the four parts of MKFHE: security assumption, key generation, plaintext encryption, and ciphertext processing. We classified MKFHE schemes according to the improved partial schemes, and we present some improved techniques and the applications of MKFHE.
first_indexed 2024-03-09T16:08:29Z
format Article
id doaj.art-d57efadde4ad4afa95b39cfad2d7446a
institution Directory Open Access Journal
issn 2227-7390
language English
last_indexed 2024-03-09T16:08:29Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Mathematics
spelling doaj.art-d57efadde4ad4afa95b39cfad2d7446a2023-11-24T16:27:50ZengMDPI AGMathematics2227-73902022-12-011024467810.3390/math10244678An Examination of Multi-Key Fully Homomorphic Encryption and Its ApplicationsMinghao Yuan0Dongdong Wang1Feng Zhang2Shenqing Wang3Shan Ji4Yongjun Ren5Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, ChinaThe 15th Research Institute of China Electronics Technology Group Corporation, Beijing 100083, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaEngineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, ChinaWith the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Illegal intrusion of attackers into the network layer disrupts the availability of data. The untrusted transmission environment increases the difficulty of users sharing private data, and various outsourced computing and application requirements bring the risk of privacy leakage. Multi-key fully homomorphic encryption (MKFHE) realizes operations between ciphertexts under different key encryption and has great application potential. Since 2012, the first MKFHE scheme LTV12 has been extended from fully homomorphic encryption (FHE) and has ignited the enthusiasm of many cryptographic researchers due to its lattice-based security and quantum-resistant properties. According to its corresponding FHE scheme, the MKFHE schemes can be divided into four kinds: Gentry–Sahai–Water (GSW), number theory research unit (NTRU), Brakerski–Gentry–Vaikuntanathan (BGV), and FHE over the tour (TFHE). Efficiency and cost are urgent issues for MKFHE. New schemes are mainly improved versions of existing schemes. The improvements are mostly related to the four parts of MKFHE: security assumption, key generation, plaintext encryption, and ciphertext processing. We classified MKFHE schemes according to the improved partial schemes, and we present some improved techniques and the applications of MKFHE.https://www.mdpi.com/2227-7390/10/24/4678multi-key fully homomorphic encryptionInternet of Thingsdistributed computingprivacy protection
spellingShingle Minghao Yuan
Dongdong Wang
Feng Zhang
Shenqing Wang
Shan Ji
Yongjun Ren
An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications
Mathematics
multi-key fully homomorphic encryption
Internet of Things
distributed computing
privacy protection
title An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications
title_full An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications
title_fullStr An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications
title_full_unstemmed An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications
title_short An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications
title_sort examination of multi key fully homomorphic encryption and its applications
topic multi-key fully homomorphic encryption
Internet of Things
distributed computing
privacy protection
url https://www.mdpi.com/2227-7390/10/24/4678
work_keys_str_mv AT minghaoyuan anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications
AT dongdongwang anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications
AT fengzhang anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications
AT shenqingwang anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications
AT shanji anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications
AT yongjunren anexaminationofmultikeyfullyhomomorphicencryptionanditsapplications
AT minghaoyuan examinationofmultikeyfullyhomomorphicencryptionanditsapplications
AT dongdongwang examinationofmultikeyfullyhomomorphicencryptionanditsapplications
AT fengzhang examinationofmultikeyfullyhomomorphicencryptionanditsapplications
AT shenqingwang examinationofmultikeyfullyhomomorphicencryptionanditsapplications
AT shanji examinationofmultikeyfullyhomomorphicencryptionanditsapplications
AT yongjunren examinationofmultikeyfullyhomomorphicencryptionanditsapplications