Simulation of a Homomorphic Encryption System


Bozduman H. Ç., Afacan E.

APPLIED MATHEMATICS AND NONLINEAR SCIENCES, cilt.5, sa.1, ss.479-484, 2020 (ESCI) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 5 Sayı: 1
  • Basım Tarihi: 2020
  • Doi Numarası: 10.2478/amns.2020.1.00046
  • Dergi Adı: APPLIED MATHEMATICS AND NONLINEAR SCIENCES
  • Derginin Tarandığı İndeksler: Emerging Sources Citation Index (ESCI), Scopus, Applied Science & Technology Source, Compendex, zbMATH, DIALNET
  • Sayfa Sayıları: ss.479-484
  • Anahtar Kelimeler: homomorphic encryption, cryptology, cloud computing
  • Gazi Üniversitesi Adresli: Evet

Özet

Cryptology is defined as the science of making communication incomprehensible to third parties who have no right to read and understand the data or messages. Cryptology consists of two parts, namely, cryptography and cryptanalysis. Cryptography analyzes methods of encrypting messages, and cryptanalysis analyzes methods of decrypting encrypted messages. Encryption is the process of translating plaintext data into something that appears to be random and meaningless. Decryption is the process of converting this random text into plaintext. Cloud computing is the legal transfer of computing services over the Internet. Cloud services let individuals and businesses to use software and hardware resources at remote locations. Widespread use of cloud computing raises the question of whether it is possible to delegate the processing of data without giving access to it. However, homomorphic encryption allows performing computations on encrypted data without decryption. In homomorphic encryption, only the encrypted version of the data is given to the untrusted computer to process. The computer will perform the computation on this encrypted data, without knowing anything on its real value. Finally, it will send back the result, and whoever has the proper deciphering key can decrypt the cryptogram correctly. The decrypted result will be equal to the intended computed value. In this paper, homomorphic encryption and their types are reviewed. Also, a simulation of somewhat homomorphic encryption is examined.