SlideShare a Scribd company logo
1 of 12
Homomorphic Encryption
Scheme
SNEHA S K
Msc CS
Bishop Heber College, Trichy
Homomorphic Encryption Scheme
• Homomorphic encryption is the conversion of
data into cipher text that can be analyzed and
worked with as if it were still in its original
form.
• Homomorphic encryption enables complex
mathematical operations to be performed on
encrypted data without compromising the
encryption.
Use Cases
• Privacy Preserving Medical Image Analysis
• Secure Load Balancing over vast regions
• Analysis over sensitive Education data
• Machine Learning as a Service
• By denoting E{⋅} as the homomorphic encryption
function and f (⋅) as the computation function, it
holds that:
• E{f (a, b)} = f (E{a}, E{b})
• An example of homomorphic encryption is the
RSA algorithm.
• Consider a modulus N and an exponent e.The
encryption of a message m is given by E{m} =
memod N.
• The homomorphic property holds, since:
• E{m1 ⋅ m2} = (m1 ⋅ m2)e mod N = (m1)e mod N ⋅
(m2)e mod N = E{m1} ⋅ E{m2}
Examples of HE
• An example of homomorphic encryption is the
RSA algorithm.
• Other examples of homomorphic encryption
schemes are
• The ECC encryption [133],
• The ElGamal cryptosystem [150] and
• The Pailler cryptosystem [151].
Pros & Cons
Advantages
• Can perform inference on
encrypted data, so the
model owner never sees
the client's private data and
therefore cannot leak it or
misuse it.
• Doesn't require interactivity
between the data and
model owners to perform
the computation.
Disadvantages
• Computationally expensive.
• Restricted to certain kinds
of calculations.
• Depending on the operation f (⋅) that can be
performed on the encrypted data, the
homomorphic encryption scheme can be defined
as additive or multiplicative.
• Additive homomorphism makes it possible to
compute sums, subtractions, and scalar
multiplication of its operands; multiplicative
homomorphism allows computation of the
product of its operands.
• The RSA algorithm is an example of multiplicative
homomorphic encryption.
• An example of additive homomorphic encryption
is the Pailler cryptosystem.
• Given a modulus n, a shared random integer
g, and user-generated random integers r1 and
r2, the homomorphic property is:
• E{m1} ⋅ E{m2} = (gm1 rn1 mod n2) ⋅
(gm2 rn2 mod n2)
• = (gm1+m2 )(r1r2)n mod n2 = E{m1 + m2}
Types of homomorphic encryption
• Homomorphic encryption schemes that are
either additive or multiplicative are termed
“partially homomorphic”.
• If both addition and multiplication are
supported, a cryptosystem is called “fully
homomorphic”.
• Additionally “somewhat homorphic”.
FHE
• Fully homomorphic cryptosystems preserve the
ring structure of the plaintexts and, therefore,
enable more complex procedures to be used.
• The investigation of fully homomorphic
encryption schemes is still in its early stages and
no practical scheme with acceptable performance
has been found (e.g., in terms of decryption
delay).
• Application of these schemes to IoT scenarios is a
rich research topic.
SWHE
• hey tend to be based on schemes that are
capable of "somewhat" homomorphic
encryption. These schemes can only perform a
limited number of successive multiplication
and addition operations on ciphertext before
the results become unreliable and impossible
to decrypt. This limitation arises directly from
the way these systems guarantee security by
relying on noise or error to make relatively
simple problems computationally intractable.
Limitations of Fully Homomorphic
Encryption
• Poor performance: Between slow computation
speed or accuracy problems, fully homomorphic
encryption remains commercially infeasible for
computationally-heavy applications.
• General consensus in the research community is
that fully homomorphic encryption research still
has many years to go, but it is useful today in
conjunction with other privacy-enhancing
technologies like secure multiparty computation.

More Related Content

What's hot

What's hot (20)

2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
The Factoring Dead: Preparing for the Cryptopocalypse
The Factoring Dead: Preparing for the CryptopocalypseThe Factoring Dead: Preparing for the Cryptopocalypse
The Factoring Dead: Preparing for the Cryptopocalypse
 
Cryptography
CryptographyCryptography
Cryptography
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
ElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptxElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptx
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 

Similar to Homomorphic Encryption Scheme: Enabling Complex Math on Encrypted Data

Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...MajedahAlkharji
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Swati Nagpal
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationMohammed Ashour
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptxSou Jana
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 

Similar to Homomorphic Encryption Scheme: Enabling Complex Math on Encrypted Data (20)

Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Ch9
Ch9Ch9
Ch9
 
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...
 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
Rsa
RsaRsa
Rsa
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
Ch09
Ch09Ch09
Ch09
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Rsa
RsaRsa
Rsa
 

More from Sneha S K

Learning from pattern in health care.pptx
Learning from pattern in health care.pptxLearning from pattern in health care.pptx
Learning from pattern in health care.pptxSneha S K
 
Key Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptxKey Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptxSneha S K
 
RMMM plan.pptx
RMMM plan.pptxRMMM plan.pptx
RMMM plan.pptxSneha S K
 
Tree Traversal.pptx
Tree Traversal.pptxTree Traversal.pptx
Tree Traversal.pptxSneha S K
 
Time Series Function.pptx
Time Series Function.pptxTime Series Function.pptx
Time Series Function.pptxSneha S K
 
AI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptxAI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptxSneha S K
 

More from Sneha S K (8)

Learning from pattern in health care.pptx
Learning from pattern in health care.pptxLearning from pattern in health care.pptx
Learning from pattern in health care.pptx
 
Key Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptxKey Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptx
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
RMMM plan.pptx
RMMM plan.pptxRMMM plan.pptx
RMMM plan.pptx
 
HMAC.pptx
HMAC.pptxHMAC.pptx
HMAC.pptx
 
Tree Traversal.pptx
Tree Traversal.pptxTree Traversal.pptx
Tree Traversal.pptx
 
Time Series Function.pptx
Time Series Function.pptxTime Series Function.pptx
Time Series Function.pptx
 
AI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptxAI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptx
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Homomorphic Encryption Scheme: Enabling Complex Math on Encrypted Data

  • 1. Homomorphic Encryption Scheme SNEHA S K Msc CS Bishop Heber College, Trichy
  • 2. Homomorphic Encryption Scheme • Homomorphic encryption is the conversion of data into cipher text that can be analyzed and worked with as if it were still in its original form. • Homomorphic encryption enables complex mathematical operations to be performed on encrypted data without compromising the encryption.
  • 3. Use Cases • Privacy Preserving Medical Image Analysis • Secure Load Balancing over vast regions • Analysis over sensitive Education data • Machine Learning as a Service
  • 4. • By denoting E{⋅} as the homomorphic encryption function and f (⋅) as the computation function, it holds that: • E{f (a, b)} = f (E{a}, E{b}) • An example of homomorphic encryption is the RSA algorithm. • Consider a modulus N and an exponent e.The encryption of a message m is given by E{m} = memod N. • The homomorphic property holds, since: • E{m1 ⋅ m2} = (m1 ⋅ m2)e mod N = (m1)e mod N ⋅ (m2)e mod N = E{m1} ⋅ E{m2}
  • 5. Examples of HE • An example of homomorphic encryption is the RSA algorithm. • Other examples of homomorphic encryption schemes are • The ECC encryption [133], • The ElGamal cryptosystem [150] and • The Pailler cryptosystem [151].
  • 6. Pros & Cons Advantages • Can perform inference on encrypted data, so the model owner never sees the client's private data and therefore cannot leak it or misuse it. • Doesn't require interactivity between the data and model owners to perform the computation. Disadvantages • Computationally expensive. • Restricted to certain kinds of calculations.
  • 7. • Depending on the operation f (⋅) that can be performed on the encrypted data, the homomorphic encryption scheme can be defined as additive or multiplicative. • Additive homomorphism makes it possible to compute sums, subtractions, and scalar multiplication of its operands; multiplicative homomorphism allows computation of the product of its operands. • The RSA algorithm is an example of multiplicative homomorphic encryption. • An example of additive homomorphic encryption is the Pailler cryptosystem.
  • 8. • Given a modulus n, a shared random integer g, and user-generated random integers r1 and r2, the homomorphic property is: • E{m1} ⋅ E{m2} = (gm1 rn1 mod n2) ⋅ (gm2 rn2 mod n2) • = (gm1+m2 )(r1r2)n mod n2 = E{m1 + m2}
  • 9. Types of homomorphic encryption • Homomorphic encryption schemes that are either additive or multiplicative are termed “partially homomorphic”. • If both addition and multiplication are supported, a cryptosystem is called “fully homomorphic”. • Additionally “somewhat homorphic”.
  • 10. FHE • Fully homomorphic cryptosystems preserve the ring structure of the plaintexts and, therefore, enable more complex procedures to be used. • The investigation of fully homomorphic encryption schemes is still in its early stages and no practical scheme with acceptable performance has been found (e.g., in terms of decryption delay). • Application of these schemes to IoT scenarios is a rich research topic.
  • 11. SWHE • hey tend to be based on schemes that are capable of "somewhat" homomorphic encryption. These schemes can only perform a limited number of successive multiplication and addition operations on ciphertext before the results become unreliable and impossible to decrypt. This limitation arises directly from the way these systems guarantee security by relying on noise or error to make relatively simple problems computationally intractable.
  • 12. Limitations of Fully Homomorphic Encryption • Poor performance: Between slow computation speed or accuracy problems, fully homomorphic encryption remains commercially infeasible for computationally-heavy applications. • General consensus in the research community is that fully homomorphic encryption research still has many years to go, but it is useful today in conjunction with other privacy-enhancing technologies like secure multiparty computation.