Homomorphic Encryption: Theory and Application

Author: Cody Tinker, Computer Engineering BSMS

Abstract

Homomorphic Encryption is an encryption scheme that describes a method of performing operations on encrypted data without the need to first decrypt the data. The features of a fully homomorphic encryption scheme are very promising, however, there are many obstacles to still overcome before a fully homomorphic scheme becomes pratical to use in pratice. This paper explores the theory behind homomorphic encryption. In addition, the results of a homomorphically AES circuit is explored to evaluate the proof-of-concept performance of a homomprhic encryption application.

Outline

Presentations and Paper

Presentation: Introduction to Homomorphic Encryption
Presentation: Homomorphic Encryption:Theory and Application
Paper: Homomorphic Encryption:Theory and Application

References

  1. Mkhinini, A., Maistri, P., Leveugle, R., & Tourki, R. (2017). HLS design of a hardware accelerator for Homomorphic Encryption. Proceedings - 2017 IEEE 20th International Symposium on Design and Diagnostics of Electronic Circuit and Systems, DDECS 2017, 178–183. https://doi.org/10.1109/DDECS.2017.7934578
  2. Foster, M. J. (2017). Accelerating Homomorphic Encryption in the Cloud Environment through High-Level Synthesis and Reconfigurable Resources. Retrieved from http://scholarworks.rit.edu/theses
  3. Sunar, B. (2015). Accelerating Fully Homomorphic Encryption in Hardware, 64(6), 1509–1521.
  4. Dai, W., Doroz, Y., & Sunar, B. (2014). Accelerating NTRU based homomorphic encryption using GPUs. 2014 IEEE High Performance Extreme Computing Conference, HPEC 2014. https://doi.org/10.1109/HPEC.2014.7041001
  5. Wang, W., & Huang, X. (2013). FPGA implementation of a large-number multiplier for fully homomorphic encryption. Proceedings - IEEE International Symposium on Circuits and Systems, 2589–2592. https://doi.org/10.1109/ISCAS.2013.6572408
  6. Acar, A., Aksu, H., Uluagac, A. S., & Conti, M. (2017). A Survey on Homomorphic Encryption Schemes: Theory and Implementation, 1–35. https://doi.org/10.1145/0000000.0000000
  7. Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing - STOC ’09, 169. https://doi.org/10.1145/1536414.1536440
  8. Moore, C., O’Neill, M., O’Sullivan, E., Doroz, Y., & Sunar, B. (2014). Practical homomorphic encryption: A survey. Proceedings - IEEE International Symposium on Circuits and Systems, 2792–2795. https://doi.org/10.1109/ISCAS.2014.6865753
  9. Güneysu, T., & Handschuh, H. (2015). Cryptographic hardware and embedded systems – CHES 2015: 17th international workshop Saint-Malo, France, september 13–16, 2015 proceedings. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9293. https://doi.org/10.1007/978-3-662-48324-4