SlideShare a Scribd company logo
Homomorphic Encryption
Scheme
SNEHA S K
Msc CS
Bishop Heber College, Trichy
Homomorphic Encryption Scheme
• Homomorphic encryption is the conversion of
data into cipher text that can be analyzed and
worked with as if it were still in its original
form.
• Homomorphic encryption enables complex
mathematical operations to be performed on
encrypted data without compromising the
encryption.
Use Cases
• Privacy Preserving Medical Image Analysis
• Secure Load Balancing over vast regions
• Analysis over sensitive Education data
• Machine Learning as a Service
• By denoting E{⋅} as the homomorphic encryption
function and f (⋅) as the computation function, it
holds that:
• E{f (a, b)} = f (E{a}, E{b})
• An example of homomorphic encryption is the
RSA algorithm.
• Consider a modulus N and an exponent e.The
encryption of a message m is given by E{m} =
memod N.
• The homomorphic property holds, since:
• E{m1 ⋅ m2} = (m1 ⋅ m2)e mod N = (m1)e mod N ⋅
(m2)e mod N = E{m1} ⋅ E{m2}
Examples of HE
• An example of homomorphic encryption is the
RSA algorithm.
• Other examples of homomorphic encryption
schemes are
• The ECC encryption [133],
• The ElGamal cryptosystem [150] and
• The Pailler cryptosystem [151].
Pros & Cons
Advantages
• Can perform inference on
encrypted data, so the
model owner never sees
the client's private data and
therefore cannot leak it or
misuse it.
• Doesn't require interactivity
between the data and
model owners to perform
the computation.
Disadvantages
• Computationally expensive.
• Restricted to certain kinds
of calculations.
• Depending on the operation f (⋅) that can be
performed on the encrypted data, the
homomorphic encryption scheme can be defined
as additive or multiplicative.
• Additive homomorphism makes it possible to
compute sums, subtractions, and scalar
multiplication of its operands; multiplicative
homomorphism allows computation of the
product of its operands.
• The RSA algorithm is an example of multiplicative
homomorphic encryption.
• An example of additive homomorphic encryption
is the Pailler cryptosystem.
• Given a modulus n, a shared random integer
g, and user-generated random integers r1 and
r2, the homomorphic property is:
• E{m1} ⋅ E{m2} = (gm1 rn1 mod n2) ⋅
(gm2 rn2 mod n2)
• = (gm1+m2 )(r1r2)n mod n2 = E{m1 + m2}
Types of homomorphic encryption
• Homomorphic encryption schemes that are
either additive or multiplicative are termed
“partially homomorphic”.
• If both addition and multiplication are
supported, a cryptosystem is called “fully
homomorphic”.
• Additionally “somewhat homorphic”.
FHE
• Fully homomorphic cryptosystems preserve the
ring structure of the plaintexts and, therefore,
enable more complex procedures to be used.
• The investigation of fully homomorphic
encryption schemes is still in its early stages and
no practical scheme with acceptable performance
has been found (e.g., in terms of decryption
delay).
• Application of these schemes to IoT scenarios is a
rich research topic.
SWHE
• hey tend to be based on schemes that are
capable of "somewhat" homomorphic
encryption. These schemes can only perform a
limited number of successive multiplication
and addition operations on ciphertext before
the results become unreliable and impossible
to decrypt. This limitation arises directly from
the way these systems guarantee security by
relying on noise or error to make relatively
simple problems computationally intractable.
Limitations of Fully Homomorphic
Encryption
• Poor performance: Between slow computation
speed or accuracy problems, fully homomorphic
encryption remains commercially infeasible for
computationally-heavy applications.
• General consensus in the research community is
that fully homomorphic encryption research still
has many years to go, but it is useful today in
conjunction with other privacy-enhancing
technologies like secure multiparty computation.

More Related Content

What's hot

12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
drewz lin
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 

What's hot (20)

Primality
PrimalityPrimality
Primality
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Critografia Asimetrica el RSA
Critografia Asimetrica el RSACritografia Asimetrica el RSA
Critografia Asimetrica el RSA
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Ecc2
Ecc2Ecc2
Ecc2
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Paillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationPaillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentation
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
One time Pad Encryption
One time Pad EncryptionOne time Pad Encryption
One time Pad Encryption
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 

Similar to Homomorphic Encryption Scheme.pptx

RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv
 

Similar to Homomorphic Encryption Scheme.pptx (20)

Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Ch9
Ch9Ch9
Ch9
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...
 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
Rsa
RsaRsa
Rsa
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
Ch09
Ch09Ch09
Ch09
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Rsa
RsaRsa
Rsa
 

More from Sneha S K

More from Sneha S K (8)

Learning from pattern in health care.pptx
Learning from pattern in health care.pptxLearning from pattern in health care.pptx
Learning from pattern in health care.pptx
 
Key Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptxKey Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptx
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
RMMM plan.pptx
RMMM plan.pptxRMMM plan.pptx
RMMM plan.pptx
 
HMAC.pptx
HMAC.pptxHMAC.pptx
HMAC.pptx
 
Tree Traversal.pptx
Tree Traversal.pptxTree Traversal.pptx
Tree Traversal.pptx
 
Time Series Function.pptx
Time Series Function.pptxTime Series Function.pptx
Time Series Function.pptx
 
AI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptxAI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptx
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Homomorphic Encryption Scheme.pptx

  • 1. Homomorphic Encryption Scheme SNEHA S K Msc CS Bishop Heber College, Trichy
  • 2. Homomorphic Encryption Scheme • Homomorphic encryption is the conversion of data into cipher text that can be analyzed and worked with as if it were still in its original form. • Homomorphic encryption enables complex mathematical operations to be performed on encrypted data without compromising the encryption.
  • 3. Use Cases • Privacy Preserving Medical Image Analysis • Secure Load Balancing over vast regions • Analysis over sensitive Education data • Machine Learning as a Service
  • 4. • By denoting E{⋅} as the homomorphic encryption function and f (⋅) as the computation function, it holds that: • E{f (a, b)} = f (E{a}, E{b}) • An example of homomorphic encryption is the RSA algorithm. • Consider a modulus N and an exponent e.The encryption of a message m is given by E{m} = memod N. • The homomorphic property holds, since: • E{m1 ⋅ m2} = (m1 ⋅ m2)e mod N = (m1)e mod N ⋅ (m2)e mod N = E{m1} ⋅ E{m2}
  • 5. Examples of HE • An example of homomorphic encryption is the RSA algorithm. • Other examples of homomorphic encryption schemes are • The ECC encryption [133], • The ElGamal cryptosystem [150] and • The Pailler cryptosystem [151].
  • 6. Pros & Cons Advantages • Can perform inference on encrypted data, so the model owner never sees the client's private data and therefore cannot leak it or misuse it. • Doesn't require interactivity between the data and model owners to perform the computation. Disadvantages • Computationally expensive. • Restricted to certain kinds of calculations.
  • 7. • Depending on the operation f (⋅) that can be performed on the encrypted data, the homomorphic encryption scheme can be defined as additive or multiplicative. • Additive homomorphism makes it possible to compute sums, subtractions, and scalar multiplication of its operands; multiplicative homomorphism allows computation of the product of its operands. • The RSA algorithm is an example of multiplicative homomorphic encryption. • An example of additive homomorphic encryption is the Pailler cryptosystem.
  • 8. • Given a modulus n, a shared random integer g, and user-generated random integers r1 and r2, the homomorphic property is: • E{m1} ⋅ E{m2} = (gm1 rn1 mod n2) ⋅ (gm2 rn2 mod n2) • = (gm1+m2 )(r1r2)n mod n2 = E{m1 + m2}
  • 9. Types of homomorphic encryption • Homomorphic encryption schemes that are either additive or multiplicative are termed “partially homomorphic”. • If both addition and multiplication are supported, a cryptosystem is called “fully homomorphic”. • Additionally “somewhat homorphic”.
  • 10. FHE • Fully homomorphic cryptosystems preserve the ring structure of the plaintexts and, therefore, enable more complex procedures to be used. • The investigation of fully homomorphic encryption schemes is still in its early stages and no practical scheme with acceptable performance has been found (e.g., in terms of decryption delay). • Application of these schemes to IoT scenarios is a rich research topic.
  • 11. SWHE • hey tend to be based on schemes that are capable of "somewhat" homomorphic encryption. These schemes can only perform a limited number of successive multiplication and addition operations on ciphertext before the results become unreliable and impossible to decrypt. This limitation arises directly from the way these systems guarantee security by relying on noise or error to make relatively simple problems computationally intractable.
  • 12. Limitations of Fully Homomorphic Encryption • Poor performance: Between slow computation speed or accuracy problems, fully homomorphic encryption remains commercially infeasible for computationally-heavy applications. • General consensus in the research community is that fully homomorphic encryption research still has many years to go, but it is useful today in conjunction with other privacy-enhancing technologies like secure multiparty computation.