CRYPTOGRAPHIC PROTECTION OF INFORMATION USING SOMEWHAT HOMOMORPHOUS ENCRYPTION ALGORITHMS
Keywords:
Homomorphic encryption, somewhat homomorphic encryption, elliptic curves, discrete logarithm, fully homomorphic encryptionAbstract
Traditional encryption algorithms ensure information security in data storage and transmission, but do not ensure confidentiality in information processing processes. Such a problem creates the task of creating a security system that eliminates all or at least some of the vulnerabilities in cloud structures. This article discusses homomorphic encryption algorithms and their types, advantages of somewhat homomorphic encryption algorithms and problems in their implementation.
References
Rivest R. L. et al. On data banks and privacy homomorphisms //Foundations of secure computation. – 1978. – Т. 4. – №. 11. – С. 169-180.
Rass S., Slamanig D. Cryptography for security and privacy in cloud computing. – Artech House, 2013.
Shafi G., Micali S. Probabilistic encryption //Journal of computer and system sciences. – 1984. – Т. 28. – №. 2. – С. 270-299.
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms //IEEE transactions on information theory. – 1985. – Т. 31. – №. 4. – С. 469-472.
Benaloh J. Dense probabilistic encryption //Proceedings of the workshop on selected areas of cryptography. – 1994. – С. 120-128.
Paillier P. Public-key cryptosystems based on composite degree residuosity classes //International conference on the theory and applications of cryptographic techniques. – Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. – С. 223-238.
Boneh D., Goh E. J., Nissim K. Evaluating 2-DNF formulas on ciphertexts //Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings 2. – Springer Berlin Heidelberg, 2005. – С. 325-341.
Chatterjee A., Aung K. M. M. Fully homomorphic encryption in real world applications. – Singapore: Springer, 2019.
Koç Ç. K., Özdemir F., Özger Z. Ö. Partially Homomorphic Encryption. – Springer, 2021. – С. 37-41.
Jain N., Cherukuri A. K. Revisiting Fully Homomorphic Encryption Schemes //arXiv preprint arXiv:2305.05904. – 2023.
Wainakh A. Homomorphic encryption for data security in cloud computing: дис. – Middle East Technical University, 2018.
Xudoynazarov U., Meliquziyev A. OCHIQ KALITLI RSA SHIFRLASH ALGORITMINI PARAMETRLI ALGEBRA ASOSIDA TAKOMILLASHTIRISH //Research and implementation. – 2023.
Additional Files
Published
How to Cite
License
Copyright (c) 2024 Umidjon Xudoynazarov, Zarifjon Xudoykulov

This work is licensed under a Creative Commons Attribution 4.0 International License.