Related Concepts
Definition
An encryption mechanism E is called homomorphic basically if it preserves certain algebraic structure between the plaintext space and the ciphertext space, where the encryption key is fixed. For example, if the product of any two ciphertexts is equal to a ciphertext of the sum of the two corresponding plaintexts: \(E({m}_{1}) {_\ast} E({m}_{2}) = E({m}_{1} + {m}_{2})\), where it is understood that all these encryptions use the same key.
Background
Homomorphic properties are natural for number-theoretic public key cryptosystems like ElGamal, Paillier, and also plain RSA. Homomorphic cryptosystems are routinely used in the design of privacy-protecting cryptographic schemes, such as secret ballot election schemes and sealed bid auction schemes. A typical use is to compute a random re-encryption cā² = E(m, rā²) of a given probabilistic encryption c = E(m, r) such that ciphertexts c and cā² contain the same plaintext m, but the...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Ajtai M, Dwork C (1997) A public-key cryptosystem with worst-case/average-case equivalence. In: Proc. 29th symposium on theory of computing (STOC ā97), ACM, New York, ppĀ 284ā293
Boneh D, Goh EJ, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts. In: Proc. 2nd theory of cryptography conference (TCC 2005), volĀ 3378. LNCS, Springer, Berlin, pĀ 325
Cohen J, Fischer M (1985) A robust and verifiable cryptographically secure election scheme. In: Proc. 26th IEEE symposium on foundations of computer science (FOCS ā85), IEEE Computer Society, ppĀ 372ā382
Cramer R, DamgĆ„rd I, Nielsen JB (2001) Multiparty computation from threshold homomorphic encryption. In: Advances in cryptologyĀ ā EUROCRYPT ā01, volĀ 2045. LNCS, Springer, Berlin, ppĀ 280ā300. Full version eprint.iacr.org/2000/055, October 27, 2000
Cramer R, Gennaro R, Schoenmakers B (1997) A secure and optimally efficient multi-authority election scheme. In: Advances in cryptologyĀ ā EUROCRYPT ā97, volĀ 1233. LNCS, Springer, Berlin, ppĀ 103ā118
DamgĆ„rd I, Jurik M (2001) A generalisation, a simplification and some applications of Paillierās probabilistic public-key system. In: Public key cryptographyĀ ā PKC ā01, vol 1992. LNCS, Springer, Berlin, ppĀ 119ā136
van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. In: Advances in cryptologyĀ ā EUROCRYPT ā10, vol 6110. LNCS, Springer, Berlin, pĀ 24
Franklin M, Haber S (1996) Joint encryption and message-efficient secure computation. J Cryptol 9(4):217ā232
Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proc. 41st symposium on theory of computing (STOC ā09), ACM, New York, pĀ 169
Goldwasser S, Micali S (1984) Probabilistic encryption. J Com Syst Sci 28(2):270ā299
Rivest R, Adleman L, Dertouzos M (1978) On data banks and privacy homomorphisms. In: Foundations of secure computation, Academic Press, ppĀ 169ā177
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Schoenmakers, B. (2011). Homomorphic Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_870
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_870
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering