EconPapers    
Economics at your fingertips  
 

An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications

Minghao Yuan, Dongdong Wang, Feng Zhang, Shenqing Wang, Shan Ji () and Yongjun Ren
Additional contact information
Minghao Yuan: Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
Dongdong Wang: The 15th Research Institute of China Electronics Technology Group Corporation, Beijing 100083, China
Feng Zhang: College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
Shenqing Wang: College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
Shan Ji: College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
Yongjun Ren: Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China

Mathematics, 2022, vol. 10, issue 24, 1-20

Abstract: With the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy. Traditional IoT architecture comes with security risks. Illegal intrusion of attackers into the network layer disrupts the availability of data. The untrusted transmission environment increases the difficulty of users sharing private data, and various outsourced computing and application requirements bring the risk of privacy leakage. Multi-key fully homomorphic encryption (MKFHE) realizes operations between ciphertexts under different key encryption and has great application potential. Since 2012, the first MKFHE scheme LTV12 has been extended from fully homomorphic encryption (FHE) and has ignited the enthusiasm of many cryptographic researchers due to its lattice-based security and quantum-resistant properties. According to its corresponding FHE scheme, the MKFHE schemes can be divided into four kinds: Gentry–Sahai–Water (GSW), number theory research unit (NTRU), Brakerski–Gentry–Vaikuntanathan (BGV), and FHE over the tour (TFHE). Efficiency and cost are urgent issues for MKFHE. New schemes are mainly improved versions of existing schemes. The improvements are mostly related to the four parts of MKFHE: security assumption, key generation, plaintext encryption, and ciphertext processing. We classified MKFHE schemes according to the improved partial schemes, and we present some improved techniques and the applications of MKFHE.

Keywords: multi-key fully homomorphic encryption; Internet of Things; distributed computing; privacy protection (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/10/24/4678/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/24/4678/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:24:p:4678-:d:999119

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:10:y:2022:i:24:p:4678-:d:999119