Homomorphic encryption

Homomorphic encryption
General
Derived fromVarious assumptions, including learning with errors, Ring learning with errors or even RSA (multiplicative) and others
Related toFunctional encryption

Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it.[1] The resulting computations are left in an encrypted form which, when decrypted, result in an output that is identical to that of the operations performed on the unencrypted data. While homomorphic encryption does not protect against side-channel attacks that observe behavior, it can be used for privacy-preserving outsourced storage and computation. This allows data to be encrypted and outsourced to commercial cloud environments for processing, all while encrypted.

As an example of a practical application of homomorphic encryption: encrypted photographs can be scanned for points of interest, without revealing the contents of a photo. However, observation of side-channels can see a photograph being sent to a point-of-interest lookup service, revealing the fact that photographs were taken.

Thus, homomorphic encryption eliminates the need for processing data in the clear, thereby preventing attacks that would enable an attacker to access that data while it is being processed, using privilege escalation.[2]

For sensitive data, such as healthcare information, homomorphic encryption can be used to enable new services by removing privacy barriers inhibiting data sharing or increasing security to existing services. For example, predictive analytics in healthcare can be hard to apply via a third-party service provider due to medical data privacy concerns. But if the predictive-analytics service provider could operate on encrypted data instead, without having the decryption keys, these privacy concerns are diminished. Moreover, even if the service provider's system is compromised, the data would remain secure.[3]

  1. ^ Technology, Massachusetts Institute of. "Researchers develop innovative method for secure operations on encrypted data without decryption". techxplore.com. Retrieved 2025-04-01.
  2. ^ Sellers, Andrew. "Council Post: Everything You Wanted To Know About Homomorphic Encryption (But Were Afraid To Ask)". Forbes. Retrieved 2023-08-18.
  3. ^ Munjal, Kundan; Bhatia, Rekha (2022). "A systematic review of homomorphic encryption and its contributions in healthcare industry". Complex & Intelligent Systems. 9 (4): 3759–3786. doi:10.1007/s40747-022-00756-z. PMC 9062639. PMID 35531323.

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search