Questions tagged [homomorphic-encryption]

Homomorphic encryption is form of encryption which allows mathematical operations to be carried out on an encrypted message, using only the ciphertext. Cryptography.SE may be more suitable for some questions on this topic.

21 questions
32
votes
2 answers

Describe an example of indistinguishability obfuscation or functional encryption

As described in Perfecting the Art of Sensible Nonsense, a major breakthrough in cryptography research was published in the summer of 2013: Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits In principle it seems…
nealmcb
  • 20,544
  • 6
  • 69
  • 116
23
votes
2 answers

Homomorphic encryption used for e-voting?

I was reading wikipedia about homomorphic encryptions, and one part got me a bit confused: "The homomorphic property of various cryptosystems can be used to create secure voting systems, ..." How would you possibly use homomorphic encryption to…
asdasdasd
  • 333
  • 2
  • 7
20
votes
4 answers

In what ways does Full or Partial Homomorphic Encryption benefit the cloud?

Can someone explain, in plain English, the practical ways FHE and PHE can be leveraged in the cloud? Some interesting (and confusing) links include this Microsoft Research PDF and this Wikipedia entry. Questions: Is homomorphic encryption…
11
votes
2 answers

Why is e-voting still a problem?

Electronic voting has been considered technical infeasible for a long time. And recently I watched a video from the channel Computerphile on YouTube where they bring up all the problems that come along with e-voting. But with distributed ledgers and…
9
votes
3 answers

Difference between fully homomorphic and semi-homomorphic encryption

What is the difference between fully homomorphic and semi-homomorphic encryption?
Willl
  • 99
  • 1
  • 3
9
votes
1 answer

E-voting: receipt-free, verifiable, and anonymous

Background In response to a system design concept, a question was posed: How do you achieve electronic voting, anonymity, and verifiability at the same time? I was informed that most experts in the field believe it to be practically impossible…
9
votes
4 answers

What Partial Homomorphic Encryption implementations exist and how do I leverage them?

It appears that only Partial Homomorphic Encryption(P.H.E.) is practical for modern day (2011) use. However I'm having difficulty locating libraries (FOSS or otherwise) that enable me to leverage this technology. El Gamal is an example of an…
9
votes
2 answers

What is currently the best Searchable Encryption (SE) algorithm that works in practice?

I'm struggling to find good literature on Searchable Encryption. There are of course a few student papers written in LaTeX using Computer Modern that has some nice Greek soups in them, but none with any actual concrete examples. The same goes for…
7
votes
5 answers

What's the State of the Art of Homomorphic Encryption?

I get the impression from some internet resources I have skimmed that homomorphic encryption is yet computationally very inefficient. However, an Infineon press release from 2010 says that the CPUs of chip cards can do computations in encrypted…
Mok-Kong Shen
  • 1,199
  • 1
  • 10
  • 14
6
votes
2 answers

homomorphic encryption and DARPA

Why the government (and the DARPA in particular)is spending all these millions to improve the homomorphic encryption?which useful usage could it get?
simone
  • 69
  • 1
6
votes
2 answers

Can fully homomorphic encryption be practical?

Fully homomorphic encryption has been implemented by Craig Gentry using ideal lattices. Can it be applied to data stored on a private cloud setup in practice? I've seen references here and on other sites that lead to the conclusion that it is very…
5
votes
1 answer

Are there any fast Homomorphic Obfuscuation techniques available?

Assuming that cryptography falls into one of three areas: Awfully weak protocols and algorithms, that are trivial to break with a low amount of effort and resources Cryptographically strong protocols and algorithms that require more time than the…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
3
votes
1 answer

Who defined the term "fully homomorphic encryption"?

Rivest et al. proposed the concept of privacy homomorphisms, but did not distinguish between partial versus fully homomorphic encryption. Gentry seems to take for granted the idea that fully homomorphic encryption must preserve both addition and…
user2752467
  • 971
  • 7
  • 11
3
votes
1 answer

How do Cloud Encryption Gateways and CASB work?

Cloud Encryption Gateways (CEG) and Cloud Access Security Brokers(CASB) are becoming popular to ensure the security and confidentiality of the data leaving to Cloud Service Providers. How do they provide such services on the data leaving the…
sashank
  • 511
  • 5
  • 17
2
votes
2 answers

Is it possible to respect a user's privacy while collecting phone MAC addresses?

In London, there are trash bins that track a phone's MAC address and monitor the users movement from one location to another. I want to see if there is any best practice for collecting private information like this that allows for analysis, but…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
1
2