TY - GEN
T1 - A probabilistic homomorphic encryption algorithm over integers - Protecting data privacy in clouds
AU - Yeh, Jyh Haw
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/7/20
Y1 - 2016/7/20
N2 - With a practical homomorphic encryption algorithm, cloud service providers can operate on users' encrypted data without having to decrypt the data. Currently only one fully homomorphic encryption algorithm and some of its variants are available in literature, first developed by Graig Gentry in 2009. Unfortunately, these algorithms are not practical because of their prohibitively expensive computing cost. This paper presents an efficient homomorphic encryption algorithm which allows both arithmetic additions and multiplications on cipher texts until the data exceeds the size of the decryption key. The proposed encryption algorithm is probabilistic because every time encrypting a same plaintext it will produce a different cipher text. This probabilistic feature is useful in hiding the equality relationship among encrypted data. In this paper, we also discuss the algorithm's security weakness, which is vulnerable to some attacks. However, in some applications, the algorithm is extremely useful. This paper describes an application of a shared encrypted storage in clouds that the algorithm can be used to protect data privacy from outside attackers. At the end of the paper, we analyze the efficiency of the algorithm, and compare them to the best implementation of the Gentry-like algorithms.
AB - With a practical homomorphic encryption algorithm, cloud service providers can operate on users' encrypted data without having to decrypt the data. Currently only one fully homomorphic encryption algorithm and some of its variants are available in literature, first developed by Graig Gentry in 2009. Unfortunately, these algorithms are not practical because of their prohibitively expensive computing cost. This paper presents an efficient homomorphic encryption algorithm which allows both arithmetic additions and multiplications on cipher texts until the data exceeds the size of the decryption key. The proposed encryption algorithm is probabilistic because every time encrypting a same plaintext it will produce a different cipher text. This probabilistic feature is useful in hiding the equality relationship among encrypted data. In this paper, we also discuss the algorithm's security weakness, which is vulnerable to some attacks. However, in some applications, the algorithm is extremely useful. This paper describes an application of a shared encrypted storage in clouds that the algorithm can be used to protect data privacy from outside attackers. At the end of the paper, we analyze the efficiency of the algorithm, and compare them to the best implementation of the Gentry-like algorithms.
KW - Data privacy in clouds
KW - Homomorphic encryption
KW - Probabilistic encryption
UR - http://www.scopus.com/inward/record.url?scp=84983462138&partnerID=8YFLogxK
U2 - 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.130
DO - 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.130
M3 - Conference contribution
AN - SCOPUS:84983462138
T3 - Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015
SP - 653
EP - 656
BT - Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015
A2 - Ma, Jianhua
A2 - Li, Ali
A2 - Ning, Huansheng
A2 - Yang, Laurence T.
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015
Y2 - 10 August 2015 through 14 August 2015
ER -