Question

In: Computer Science

One research topic in cryptography is to create homomorphic encryption schemes. In such schemes, it is...

One research topic in cryptography is to create homomorphic encryption schemes. In such schemes, it is possible to do operations on the ciphertext without performing decryption. Give an example of where homomorphic encryption would be useful. You do not have to give a specific cryptographic method but describe a situation where you would want to do computations on ciphertext. Be specific: what is the information, what is encrypted, and what the computation is.

Related concept: given an RSA scheme with plaintexts P1 and P2 and respective ciphertexts C1 and C2, show how one can find the ciphertext corresponding to P1 x P2 (“x” is multiplication) without encrypting P1 x P2.

Solutions

Expert Solution

Homomorphic encryption technique is technique where the recieved encrypted data is subjected to processing or calculation without decrypting. This technique wont seek the secret key used to encrypt the data for the processing. This calculation produce an encrypted data and on decrypting the data after calculation, we get the same data as done with decryption. This will help to keep the data encrypted and there by protected even at the time of processing.

There are different types of homomorphic encryption techniques:

  • Partially homomorphic - Used where the evaluation of circuit consist of only 1 type of gate. (addition or multiplication)
  • Somewhat homomorphic - This can can evaluate 2 types of gate for subset circuits.
  • Leveled fully homomorphic - This supports arbitary circuits with bounded depth.
  • Fully homomorphic - This allow evaluation of arbitaryy circuit of unbounded depth. This is the strongest homomorphic encryption.

There are several application where the input data and output data are preserved as encrypted. Homomorphic encryption technique can be used in such applications. Homomorphic encryption is used in industries like health care where to enable new services inhibiting data sharing by removing privacy barriers. For example, due to medical privacy concerns, it is hard to apply predictive analytics in heospitals. Homomophic encryption can be used to keep the data encrypted and so private. So the predictive analysis can be done without the concern of privacy.


Related Solutions

Topic: Encrypt-then-authenticate scheme, Cryptography Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM...
Topic: Encrypt-then-authenticate scheme, Cryptography Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM = (GenM, MacM, VrfyM) be a MAC scheme. (b) Prove that Π is unforgeable for any encryption scheme ΠE (even if not CPA-secure) and any secure MAC scheme ΠM (even if not strongly secure).
Topic: Encrypt-then-authenticate scheme, Cryptography Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM...
Topic: Encrypt-then-authenticate scheme, Cryptography Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM = (GenM, MacM, VrfyM) be a MAC scheme. (a) Formalize the construction of the “encrypt-then-authenticate” scheme Π = (Gen, Enc, Dec) given ΠE and ΠM
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with...
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with descritpions.
Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and...
Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and K2 respectively. Is this method more secure than the regular single DES encryption? Please explain your reason.
Consider the encryption efforts of one of your current or past employers, or research a typical...
Consider the encryption efforts of one of your current or past employers, or research a typical enterprise network and discuss the following: Where is encryption deployed in the enterprise, and what critical data or business process is it protecting? How does the organization handle management of cryptographic keys? Explain the policies, tools, and/or protocols used for key generation, key exchange, key storage, key use, key destruction, and replacement of lost keys.
Based on your understanding of the topic, conduct a research and create a report on the...
Based on your understanding of the topic, conduct a research and create a report on the political battle for universal healthcare in the United States. Your report should include the following elements: History of the national healthcare reform starting from the early days struggle for a national health plan to the present day. Political struggle to pass PPACA. Political impact of Medicare and Medicaid on the push for universal coverage. Major issues from the legislative and executive (presidential) perspective. Who...
(Elgamal encryption): given elgamal encryption ciphersystem: a)show how can we create a new legal encryption from...
(Elgamal encryption): given elgamal encryption ciphersystem: a)show how can we create a new legal encryption from two different encryptions that we don't know their decryptions b)how can an adversary take advantage of the scheme at a) (what's written above), in order to attack a preknown encrypted text? elaborate
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial encryption algorithms. Find one that you feel may be “snake oil”. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
Topic is cryptography 10.increment the digits 858 of the ISBN of the text (ISBN13: 9780890068588) to...
Topic is cryptography 10.increment the digits 858 of the ISBN of the text (ISBN13: 9780890068588) to be 859. Then, by trial and error, change the check-sum (the last digit of the ISBN), to identify the title of the next book published by Artech House.
Write a research on the following topic Topic (select one): ETHICS IN ORGANIZATION OR COMMUNICATION PROBLEM...
Write a research on the following topic Topic (select one): ETHICS IN ORGANIZATION OR COMMUNICATION PROBLEM OR SUPPLY CHAIN REQUIRED: Structure of research 1. Introduction 2. Why choose this topic 3. Research objective 4. Literature review 5. Conclusion
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT