SlideShare uma empresa Scribd logo
1 de 12
Homomorphic Encryption
Scheme
SNEHA S K
Msc CS
Bishop Heber College, Trichy
Homomorphic Encryption Scheme
• Homomorphic encryption is the conversion of
data into cipher text that can be analyzed and
worked with as if it were still in its original
form.
• Homomorphic encryption enables complex
mathematical operations to be performed on
encrypted data without compromising the
encryption.
Use Cases
• Privacy Preserving Medical Image Analysis
• Secure Load Balancing over vast regions
• Analysis over sensitive Education data
• Machine Learning as a Service
• By denoting E{⋅} as the homomorphic encryption
function and f (⋅) as the computation function, it
holds that:
• E{f (a, b)} = f (E{a}, E{b})
• An example of homomorphic encryption is the
RSA algorithm.
• Consider a modulus N and an exponent e.The
encryption of a message m is given by E{m} =
memod N.
• The homomorphic property holds, since:
• E{m1 ⋅ m2} = (m1 ⋅ m2)e mod N = (m1)e mod N ⋅
(m2)e mod N = E{m1} ⋅ E{m2}
Examples of HE
• An example of homomorphic encryption is the
RSA algorithm.
• Other examples of homomorphic encryption
schemes are
• The ECC encryption [133],
• The ElGamal cryptosystem [150] and
• The Pailler cryptosystem [151].
Pros & Cons
Advantages
• Can perform inference on
encrypted data, so the
model owner never sees
the client's private data and
therefore cannot leak it or
misuse it.
• Doesn't require interactivity
between the data and
model owners to perform
the computation.
Disadvantages
• Computationally expensive.
• Restricted to certain kinds
of calculations.
• Depending on the operation f (⋅) that can be
performed on the encrypted data, the
homomorphic encryption scheme can be defined
as additive or multiplicative.
• Additive homomorphism makes it possible to
compute sums, subtractions, and scalar
multiplication of its operands; multiplicative
homomorphism allows computation of the
product of its operands.
• The RSA algorithm is an example of multiplicative
homomorphic encryption.
• An example of additive homomorphic encryption
is the Pailler cryptosystem.
• Given a modulus n, a shared random integer
g, and user-generated random integers r1 and
r2, the homomorphic property is:
• E{m1} ⋅ E{m2} = (gm1 rn1 mod n2) ⋅
(gm2 rn2 mod n2)
• = (gm1+m2 )(r1r2)n mod n2 = E{m1 + m2}
Types of homomorphic encryption
• Homomorphic encryption schemes that are
either additive or multiplicative are termed
“partially homomorphic”.
• If both addition and multiplication are
supported, a cryptosystem is called “fully
homomorphic”.
• Additionally “somewhat homorphic”.
FHE
• Fully homomorphic cryptosystems preserve the
ring structure of the plaintexts and, therefore,
enable more complex procedures to be used.
• The investigation of fully homomorphic
encryption schemes is still in its early stages and
no practical scheme with acceptable performance
has been found (e.g., in terms of decryption
delay).
• Application of these schemes to IoT scenarios is a
rich research topic.
SWHE
• hey tend to be based on schemes that are
capable of "somewhat" homomorphic
encryption. These schemes can only perform a
limited number of successive multiplication
and addition operations on ciphertext before
the results become unreliable and impossible
to decrypt. This limitation arises directly from
the way these systems guarantee security by
relying on noise or error to make relatively
simple problems computationally intractable.
Limitations of Fully Homomorphic
Encryption
• Poor performance: Between slow computation
speed or accuracy problems, fully homomorphic
encryption remains commercially infeasible for
computationally-heavy applications.
• General consensus in the research community is
that fully homomorphic encryption research still
has many years to go, but it is useful today in
conjunction with other privacy-enhancing
technologies like secure multiparty computation.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Rc4
Rc4Rc4
Rc4
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
The Factoring Dead: Preparing for the Cryptopocalypse
The Factoring Dead: Preparing for the CryptopocalypseThe Factoring Dead: Preparing for the Cryptopocalypse
The Factoring Dead: Preparing for the Cryptopocalypse
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Ch01
Ch01Ch01
Ch01
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
4 أنواع خوارزميات التشفير
4  أنواع خوارزميات التشفير4  أنواع خوارزميات التشفير
4 أنواع خوارزميات التشفير
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 

Semelhante a Homomorphic Encryption Scheme.pptx

Fully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptxFully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptxssuser1716c81
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...MajedahAlkharji
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Swati Nagpal
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationMohammed Ashour
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptxSou Jana
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 

Semelhante a Homomorphic Encryption Scheme.pptx (20)

Fully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptxFully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptx
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Ch9
Ch9Ch9
Ch9
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...
 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
Rsa
RsaRsa
Rsa
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
Ch09
Ch09Ch09
Ch09
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 

Mais de Sneha S K

Learning from pattern in health care.pptx
Learning from pattern in health care.pptxLearning from pattern in health care.pptx
Learning from pattern in health care.pptxSneha S K
 
Key Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptxKey Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptxSneha S K
 
RMMM plan.pptx
RMMM plan.pptxRMMM plan.pptx
RMMM plan.pptxSneha S K
 
Tree Traversal.pptx
Tree Traversal.pptxTree Traversal.pptx
Tree Traversal.pptxSneha S K
 
Time Series Function.pptx
Time Series Function.pptxTime Series Function.pptx
Time Series Function.pptxSneha S K
 
AI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptxAI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptxSneha S K
 

Mais de Sneha S K (8)

Learning from pattern in health care.pptx
Learning from pattern in health care.pptxLearning from pattern in health care.pptx
Learning from pattern in health care.pptx
 
Key Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptxKey Agreement, Distribution and Security, Bootstrapping.pptx
Key Agreement, Distribution and Security, Bootstrapping.pptx
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
RMMM plan.pptx
RMMM plan.pptxRMMM plan.pptx
RMMM plan.pptx
 
HMAC.pptx
HMAC.pptxHMAC.pptx
HMAC.pptx
 
Tree Traversal.pptx
Tree Traversal.pptxTree Traversal.pptx
Tree Traversal.pptx
 
Time Series Function.pptx
Time Series Function.pptxTime Series Function.pptx
Time Series Function.pptx
 
AI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptxAI as the foundation for Cognitive Computing.pptx
AI as the foundation for Cognitive Computing.pptx
 

Último

Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 

Último (20)

Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Homomorphic Encryption Scheme.pptx

  • 1. Homomorphic Encryption Scheme SNEHA S K Msc CS Bishop Heber College, Trichy
  • 2. Homomorphic Encryption Scheme • Homomorphic encryption is the conversion of data into cipher text that can be analyzed and worked with as if it were still in its original form. • Homomorphic encryption enables complex mathematical operations to be performed on encrypted data without compromising the encryption.
  • 3. Use Cases • Privacy Preserving Medical Image Analysis • Secure Load Balancing over vast regions • Analysis over sensitive Education data • Machine Learning as a Service
  • 4. • By denoting E{⋅} as the homomorphic encryption function and f (⋅) as the computation function, it holds that: • E{f (a, b)} = f (E{a}, E{b}) • An example of homomorphic encryption is the RSA algorithm. • Consider a modulus N and an exponent e.The encryption of a message m is given by E{m} = memod N. • The homomorphic property holds, since: • E{m1 ⋅ m2} = (m1 ⋅ m2)e mod N = (m1)e mod N ⋅ (m2)e mod N = E{m1} ⋅ E{m2}
  • 5. Examples of HE • An example of homomorphic encryption is the RSA algorithm. • Other examples of homomorphic encryption schemes are • The ECC encryption [133], • The ElGamal cryptosystem [150] and • The Pailler cryptosystem [151].
  • 6. Pros & Cons Advantages • Can perform inference on encrypted data, so the model owner never sees the client's private data and therefore cannot leak it or misuse it. • Doesn't require interactivity between the data and model owners to perform the computation. Disadvantages • Computationally expensive. • Restricted to certain kinds of calculations.
  • 7. • Depending on the operation f (⋅) that can be performed on the encrypted data, the homomorphic encryption scheme can be defined as additive or multiplicative. • Additive homomorphism makes it possible to compute sums, subtractions, and scalar multiplication of its operands; multiplicative homomorphism allows computation of the product of its operands. • The RSA algorithm is an example of multiplicative homomorphic encryption. • An example of additive homomorphic encryption is the Pailler cryptosystem.
  • 8. • Given a modulus n, a shared random integer g, and user-generated random integers r1 and r2, the homomorphic property is: • E{m1} ⋅ E{m2} = (gm1 rn1 mod n2) ⋅ (gm2 rn2 mod n2) • = (gm1+m2 )(r1r2)n mod n2 = E{m1 + m2}
  • 9. Types of homomorphic encryption • Homomorphic encryption schemes that are either additive or multiplicative are termed “partially homomorphic”. • If both addition and multiplication are supported, a cryptosystem is called “fully homomorphic”. • Additionally “somewhat homorphic”.
  • 10. FHE • Fully homomorphic cryptosystems preserve the ring structure of the plaintexts and, therefore, enable more complex procedures to be used. • The investigation of fully homomorphic encryption schemes is still in its early stages and no practical scheme with acceptable performance has been found (e.g., in terms of decryption delay). • Application of these schemes to IoT scenarios is a rich research topic.
  • 11. SWHE • hey tend to be based on schemes that are capable of "somewhat" homomorphic encryption. These schemes can only perform a limited number of successive multiplication and addition operations on ciphertext before the results become unreliable and impossible to decrypt. This limitation arises directly from the way these systems guarantee security by relying on noise or error to make relatively simple problems computationally intractable.
  • 12. Limitations of Fully Homomorphic Encryption • Poor performance: Between slow computation speed or accuracy problems, fully homomorphic encryption remains commercially infeasible for computationally-heavy applications. • General consensus in the research community is that fully homomorphic encryption research still has many years to go, but it is useful today in conjunction with other privacy-enhancing technologies like secure multiparty computation.