Author
Listed:
- Jung Hee Cheon
(Seoul National University)
- Anamaria Costache
(Trondheim, Norway; Intel AI Research, Norwegian University of Science and Technology)
- Radames Cruz Moreno
(Microsoft Research)
- Wei Dai
(Microsoft Research, Cryptography and Privacy Research Group)
- Nicolas Gama
(Inpher)
- Mariya Georgieva
(Inpher)
- Shai Halevi
(Yorktown Heights, Algorand Foundation)
- Miran Kim
(Ulsan National Institute of Science and Technology)
- Sunwoong Kim
(University of Washington Bothell)
- Kim Laine
(Microsoft Research, Cryptography and Privacy Research Group)
- Yuriy Polyakov
(Duality Technologies)
- Yongsoo Song
(Seoul National University)
Abstract
Homomorphic encryption (HE) enables processing encrypted data without decrypting it. This technology can be used, for example, to allow a public cloud to operate on secret data without the cloud learning anything about the data. Simply encrypt the secret data with homomorphic encryption before sending it to the cloud, have the cloud process the encrypted data and return the encrypted result, and finally decrypt the encrypted result. Here is a simplistic “hello world” example using homomorphic encryption: # Every encryption needs a secret key. Let's get one of those. myEncryptionKey = generateEncryptionKey() # Now we can encrypt some very secret data. encrypted5 = encrypt(myEncryptionKey, 5) encrypted12 = encrypt(myEncryptionKey, 12) excrypted2 = encrypt(myEncryptionKey, 2) # We have three ciphertexts now. # We want the sum of the first two. # Luckily we used homomorphic encryption, so we can actually do this. encrypted17 = addCiphertexts(encrypted5, encrypted12) # Maybe we want to multiply the result by the 3rd ciphertext. encrypted34 = multiplyCiphertexts(encrypted17, encrypted2) # See that? We operated on ciphertexts without needing the key. # But no matter what we compute, the result is always encrypted. # To actually see the final result, we have to use the key. decrypted34 = decrypt(myEncryptionKey, encrypted34) print(decrypted34) # This should print '34'
Suggested Citation
Jung Hee Cheon & Anamaria Costache & Radames Cruz Moreno & Wei Dai & Nicolas Gama & Mariya Georgieva & Shai Halevi & Miran Kim & Sunwoong Kim & Kim Laine & Yuriy Polyakov & Yongsoo Song, 2021.
"Introduction to Homomorphic Encryption and Schemes,"
Springer Books, in: Kristin Lauter & Wei Dai & Kim Laine (ed.), Protecting Privacy through Homomorphic Encryption, pages 3-28,
Springer.
Handle:
RePEc:spr:sprchp:978-3-030-77287-1_1
DOI: 10.1007/978-3-030-77287-1_1
Download full text from publisher
To our knowledge, this item is not available for
download. To find whether it is available, there are three
options:
1. Check below whether another version of this item is available online.
2. Check on the provider's
web page
whether it is in fact available.
3. Perform a
for a similarly titled item that would be
available.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:sprchp:978-3-030-77287-1_1. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.