Homomorphic encryption the “Holy Grail” of cryptography

Homomorphic encryption is the cryptosystem which allows computations on encrypted data achieving the goal of protecting the privacy of data during communication and storage process. For decades' Homomorphic encryption is the Holy Grail of cryptography, nonetheless constructing algorithms and implementing methods of homomorphic encryption schemes are sophisticated. This paper clarifies the concept, categories and construction methods of Homomorphic encryption by sailing in its complicated algorithms from the starting spark of algebraically homomorphic encryption to the approach of constructing fully homomorphic encryption from SomeWhat homomorphic encryption.

[1]  Frederik Vercauteren,et al.  Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.

[2]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[3]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[4]  Shai Halevi,et al.  Algorithms in HElib , 2014, CRYPTO.

[5]  S. Halevi,et al.  Design and Implementation of a Homomorphic-Encryption Library , 2012 .

[6]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[8]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[9]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[10]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[11]  Craig Gentry,et al.  Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.

[12]  Shai Halevi,et al.  Bootstrapping for HElib , 2015, EUROCRYPT.

[13]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[14]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[15]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[16]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.