Homomorphic encryption security - a review


  • J. Phani Prasad
  • B. Seetha Ramulu
  • E. Amarnatha Reddy






Cloud, Decryption, Encryption, Homomorphic encryption, RSA Security


As the Data and Technology is increasing exponentially the security and privacy issues are becoming a major concern in the present scenario, lot of security mechanisms are in to real time and practice, but even there are some bottlenecks with the existing security techniques. In this work we are giving the essence and importance of an encryption scheme called homomorphic encryption and its related issues.



[1] Taher El Gamal (1985), “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithmsâ€, in Advances in Cryptology, pp. 10-18, Springer Berlin Heidelberg.

[2] Shahzadi Farah et al. (2012), “An Experimental Study on Performance Evaluation of Asymmetric Encryption Algorithmsâ€, Recent Advances in Information Science, Proceeding of the 3rd European Conf. of Computer Science, (EECS-12).

[3] Rivest Ronald L, Adleman Leonard M and Dertouzos Michael (1978), “On Data Banks and Privacy Homomorphismâ€, Foundations of Secure Computation, Vol. 4, No. 11, pp. 169-180.

[4] Carlos Aguilar Melchor, Simon Fau, Caroline Fontaine et al. (2013), “Recent Advances in Homomorphic Encryptionâ€, IEEE Singal Processing Magazine, March, pp. 108-117.

[5] Liu Wentao (2012), “Research on Cloud Computing Security Problem and Strategyâ€, Proceedings of IEEE Conference.

[6] Ramgovind S, Eloff M and Smith E (2010), “The Management of Security in Cloud Computingâ€, Proceedings of IEEE Conference

[7] Naser A W S and Bin Md Fadli (2013), “Use of Cryptography in Cloud Computingâ€, pp. 179-184, Proceedings of IEEE International Confer ence on Control System, Malaysia

[8] Rastogi Garima and Sushil Rama (2015), “Cloud Computing Implementation: Key Issues and Solutionâ€, Proceedings of IEEE Conference INDIACOM, pp. 173-179.

[9] Gentry C (2009), “Fully Homomorphic Encryption Using Ideal Latticesâ€, ACM Symposium on Theory of Computing, pp. 169-178.

[10] Garima Rastogi and Rama Sushil (2015) ,â€cloud computing security and Homomorphic Encryptionâ€, pp 48-58.

[11] Payal V. Parmar (2014), “Survey of Various Homomorphic Encryption algorithms and Schemesâ€, International Journal of Computer Applications, pp 26-32.

View Full Article: