CRYPTOGRAPHIC PROTECTION OF INFORMATION USING SOMEWHAT HOMOMORPHOUS ENCRYPTION ALGORITHMS

Authors

Keywords:

Homomorphic encryption, somewhat homomorphic encryption, elliptic curves, discrete logarithm, fully homomorphic encryption

Abstract

Traditional encryption algorithms ensure information security in data storage and transmission, but do not ensure confidentiality in information processing processes. Such a problem creates the task of creating a security system that eliminates all or at least some of the vulnerabilities in cloud structures. This article discusses homomorphic encryption algorithms and their types, advantages of somewhat homomorphic encryption algorithms and problems in their implementation.

Author Biography

Zarifjon Xudoykulov, TUIT

Toshkent axborot texnologiyalari universiteti Kriptologiya kafedrasi dotsenti

References

Rivest R. L. et al. On data banks and privacy homomorphisms //Foundations of secure computation. – 1978. – Т. 4. – №. 11. – С. 169-180.

Rass S., Slamanig D. Cryptography for security and privacy in cloud computing. – Artech House, 2013.

Shafi G., Micali S. Probabilistic encryption //Journal of computer and system sciences. – 1984. – Т. 28. – №. 2. – С. 270-299.

ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms //IEEE transactions on information theory. – 1985. – Т. 31. – №. 4. – С. 469-472.

Benaloh J. Dense probabilistic encryption //Proceedings of the workshop on selected areas of cryptography. – 1994. – С. 120-128.

Paillier P. Public-key cryptosystems based on composite degree residuosity classes //International conference on the theory and applications of cryptographic techniques. – Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. – С. 223-238.

Boneh D., Goh E. J., Nissim K. Evaluating 2-DNF formulas on ciphertexts //Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings 2. – Springer Berlin Heidelberg, 2005. – С. 325-341.

Chatterjee A., Aung K. M. M. Fully homomorphic encryption in real world applications. – Singapore: Springer, 2019.

Koç Ç. K., Özdemir F., Özger Z. Ö. Partially Homomorphic Encryption. – Springer, 2021. – С. 37-41.

Jain N., Cherukuri A. K. Revisiting Fully Homomorphic Encryption Schemes //arXiv preprint arXiv:2305.05904. – 2023.

Wainakh A. Homomorphic encryption for data security in cloud computing: дис. – Middle East Technical University, 2018.

Xudoynazarov U., Meliquziyev A. OCHIQ KALITLI RSA SHIFRLASH ALGORITMINI PARAMETRLI ALGEBRA ASOSIDA TAKOMILLASHTIRISH //Research and implementation. – 2023.

Published

2024-12-28

How to Cite

Xudoynazarov, U., & Xudoykulov, Z. (2024). CRYPTOGRAPHIC PROTECTION OF INFORMATION USING SOMEWHAT HOMOMORPHOUS ENCRYPTION ALGORITHMS . The Descendants of Al-Fargani, (4), 130–135. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/547

Issue

Section

Статьи

Categories