A Symmetric FHE Scheme Based on Linear Algebra

Abstract

FHE is considered to be Holy Grail of cloud computing. Many applications of cloud computing inherently need symmetric keys while very few FHE schemes have been proposed with symmetric keys. Even with the schemes based on public key cryptography a major hurdle has been the accumulation of noise in ciphertexts leading to limited size of circuits that can be evaluated using the scheme homomorphically. Noise is eliminated through refresh procedure, which has been made essentially possible with public keys containing private keys as a part. Moreover, refreshing of ciphertext is time consuming. We propose here a method of refreshing the ciphertext while not disclosing the secret key, that is, in a symmetric cryptosystem. Also, our scheme doesn’t need any evaluation key thus enabling secure delegation of data processing using such scheme.

Authors and Affiliations

Iti Sharma

Keywords

Related Articles

Preventing mitm attack in simple secure pairing in Bluetooth

Secure simple pairing has been adopted by Bluetooth version “Bluetooth 2.1+EDR(ENHANCED DATA RATE).It should be noted that for establishing Bluetooth connection that uses Diffie hellman public cryptography in its commu...

Efficient Data Sharing with Unbounded Ciphertext Classes in Cloud Storage using Single key

Cloud computing is an emerging paradigm in which resources of the computing infrastructure can be able to share over the internet. As this paradigm also have many challenges for data security and access control when user...

Exploration of Cloud Computing and its Essential Facets

Cloud computing is all about how we can use external services over network by various resources provided by many different companies that share and access through the internet to perform many commercial essentialities. C...

DETECTION OF VISUAL IMPAIRMENTS USING BACK PROPAGATION NEURAL NETWORKS

Proliferative diabetic retinopathy is the more serious conditions as it involves the proliferative growth of abnormal new vessels on the retina. New vessels characteristic appearance like narrower calibre and more tortuo...

Stegocrypto - A Review Of Steganography Techniques Using Cryptography

The information security has become essential part of today’s world due to extensive use of internet. The privacy of secret data can be achieved with two classical methods of data security namely Cryptography and Stegano...

Download PDF file
  • EP ID EP99746
  • DOI -
  • Views 122
  • Downloads 0

How To Cite

Iti Sharma (2014). A Symmetric FHE Scheme Based on Linear Algebra. International Journal of Computer Science & Engineering Technology, 5(5), 558-562. https://europub.co.uk/articles/-A-99746