SlideShare a Scribd company logo
2
Most read
8
Most read
12
Most read
HOMOMORPHIC
ENCRYPTION
By,
Sreelakshmy.R
A Ganga Mythily
Private Search
Delegate PROCESSING of data
without giving away ACCESS to it
► You: Encrypt the query, send to Google
(Google does not know the key, cannot “see” the query)
► Google: Encrypted query → Encrypted results
(You decrypt and recover the search results)
2 of 32
Private Cloud Computing
Delegate PROCESSING of data
without giving away ACCESS to it
(Input: x) (Program: P)
Enc(x), P → Enc(P(x))
Encrypt x
3 of 32
A form of encryption which allows specific types of
computations to be carried out on ciphertext and
generate an encrypted result which, when decrypted,
matches the result of operations performed on the
plaintext.
What is homomorphic encryption?
Homomorphic encryption
Different types of HE
- Partially Homomorphic - (Additively or Multiplicatively)
- RSA
- ElGamal
- Paillier
- Fully Homomorphic
- Gentry’s System
Applications
- E-voting
- Biometric verification
- Protection of mobile agent
- Lottery protocol
Electronic Voting- Protecting Data
A Symmetric Homomorphic
Encryption Scheme over Integers
Shared key: odd integer p
● To encrypt a bit m:
Choose at random large q, small r (|r| < p/2)
Cipher c = pq + 2r + m [ Ciphertext is close to a multiple of p ]
● To decrypt c:
Message m = (c mod p) mod 2
How is it homomorphic?
Homomorphic Addition
c1 = q1p + 2r1 + m1
c2 = q2p + 2r2 + m2
c1 + c2 = (q1 + q2)p + 2(r1 + r2) + (m1 + m2)
c’ = q’p + 2 r’ + m’
How is it homomorphic?
Homomorphic Multiplication
c1 = q1p + 2r1 + m1
c2 = q2p + 2r2 + m2
c1 *c2 =(c1q2+q1c2q1q2)p + 2(2r1r2 + r1m2 + m1r2) + m1m2
c’ = q’p + 2 r’ + m’
Paillier Encryption
- Pascal Paillier in 1999
- Probabilistic algorithm
- Additively homomorphic system
m = plaintext, c = ciphertext
E(m) is encryption of m, D(c) is decryption of c
D(E(m1) E(m2)) = m1 + m2
Thank you

More Related Content

PPTX
Homomorphic Encryption
PPTX
Homomorphic encryption
PPTX
Homomorphic Encryption
PDF
Introduction to Homomorphic Encryption
PPTX
Fully Homomorphic Encryption (1).pptx
PPTX
Partial Homomorphic Encryption
PPT
Elliptical curve cryptography
PPTX
Elliptic Curve Cryptography
Homomorphic Encryption
Homomorphic encryption
Homomorphic Encryption
Introduction to Homomorphic Encryption
Fully Homomorphic Encryption (1).pptx
Partial Homomorphic Encryption
Elliptical curve cryptography
Elliptic Curve Cryptography

What's hot (20)

PPTX
Intro to modern cryptography
PPTX
Homomorphic Encryption Scheme.pptx
PDF
A Brief History of Cryptography
PPTX
Number theory and cryptography
PDF
Asymmetric Cryptography
PPTX
RSA algorithm
PPTX
Asymmetric Cryptography.pptx
PPT
Public Key Cryptography and RSA algorithm
PPTX
Principles of public key cryptography and its Uses
PPTX
Homomorphic encryption in cloud computing final
PPT
RSA Algorithm - Public Key Cryptography
PDF
Elliptic Curve Cryptography
PPTX
Homomorphic Encryption
PPTX
Cryptography
PPT
Cryptography Intro
PDF
An introduction to X.509 certificates
PDF
Computer Security Lecture 7: RSA
PPTX
Cryptography and Network Security
PDF
Introduction to Cryptography
Intro to modern cryptography
Homomorphic Encryption Scheme.pptx
A Brief History of Cryptography
Number theory and cryptography
Asymmetric Cryptography
RSA algorithm
Asymmetric Cryptography.pptx
Public Key Cryptography and RSA algorithm
Principles of public key cryptography and its Uses
Homomorphic encryption in cloud computing final
RSA Algorithm - Public Key Cryptography
Elliptic Curve Cryptography
Homomorphic Encryption
Cryptography
Cryptography Intro
An introduction to X.509 certificates
Computer Security Lecture 7: RSA
Cryptography and Network Security
Introduction to Cryptography
Ad

Viewers also liked (20)

PDF
Security Analytics using ELK stack
PPTX
Dll preloading-attack
PDF
Buffer overflow Attacks
PPTX
Watering hole attacks case study analysis
PDF
Format string vunerability
PDF
Dynamic Binary Instrumentation
PPTX
Dissecting Android APK
PPTX
Advanced malware analysis training session11 part2 dissecting the heart beat ...
PPTX
Reversing malware analysis training part11 exploit development advanced
PPTX
Investigating Malware using Memory Forensics
PPTX
Advanced malwareanalysis training session2 botnet analysis part1
ODP
Introduction to Binary Exploitation
PPTX
Reversing malware analysis training part6 practical reversing
PPTX
Reversing malware analysis training part10 exploit development basics
PPTX
Advanced malware analysis training session3 botnet analysis part2
PPTX
Exploits & Mitigations - Memory Corruption Techniques
PDF
POS Malware: Is your Debit/Credit Transcations Secure?
PPTX
Introduction to ICS/SCADA security
PPTX
Hunting rootkit from dark corners of memory
Security Analytics using ELK stack
Dll preloading-attack
Buffer overflow Attacks
Watering hole attacks case study analysis
Format string vunerability
Dynamic Binary Instrumentation
Dissecting Android APK
Advanced malware analysis training session11 part2 dissecting the heart beat ...
Reversing malware analysis training part11 exploit development advanced
Investigating Malware using Memory Forensics
Advanced malwareanalysis training session2 botnet analysis part1
Introduction to Binary Exploitation
Reversing malware analysis training part6 practical reversing
Reversing malware analysis training part10 exploit development basics
Advanced malware analysis training session3 botnet analysis part2
Exploits & Mitigations - Memory Corruption Techniques
POS Malware: Is your Debit/Credit Transcations Secure?
Introduction to ICS/SCADA security
Hunting rootkit from dark corners of memory
Ad

Similar to Homomorphic encryption (20)

PDF
Digital Signatures: Reassessing security of randomizable signatures
PPTX
Paillier Cryptosystem
PPT
Digital Signature in CryptographyElgammal
PDF
IHE-Columbia-Theory- diploma Seminar.pdf
PPT
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
PDF
Presentation on Cryptography_Based on IEEE_Paper
PPTX
Cloud computing and security 03
PPT
Digital signature schemes
PDF
Public-Key Cryptography.pdfWrite the result of the following operation with t...
PDF
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
PPTX
Cryptography and network security
PDF
A survey on Fully Homomorphic Encryption
PDF
B017631014
PDF
Survey on asymmetric key cryptography algorithms
PPT
Digital signature algorithm (de la cruz, genelyn).ppt 2
PPTX
Cloud computing and security final
PDF
F010243136
PDF
PKC&RSA
PPTX
Secure and privacy-preserving data transmission and processing using homomorp...
PPTX
Lattice based Merkle for post-quantum epoch
Digital Signatures: Reassessing security of randomizable signatures
Paillier Cryptosystem
Digital Signature in CryptographyElgammal
IHE-Columbia-Theory- diploma Seminar.pdf
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Presentation on Cryptography_Based on IEEE_Paper
Cloud computing and security 03
Digital signature schemes
Public-Key Cryptography.pdfWrite the result of the following operation with t...
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
Cryptography and network security
A survey on Fully Homomorphic Encryption
B017631014
Survey on asymmetric key cryptography algorithms
Digital signature algorithm (de la cruz, genelyn).ppt 2
Cloud computing and security final
F010243136
PKC&RSA
Secure and privacy-preserving data transmission and processing using homomorp...
Lattice based Merkle for post-quantum epoch

More from Cysinfo Cyber Security Community (20)

PDF
Understanding Malware Persistence Techniques by Monnappa K A
PDF
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
PDF
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
PPTX
Emerging Trends in Cybersecurity by Amar Prusty
PDF
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
PDF
Closer look at PHP Unserialization by Ashwin Shenoi
PDF
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
PDF
The Art of Executing JavaScript by Akhil Mahendra
PDF
Reversing and Decrypting Malware Communications by Monnappa
PPTX
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
PPTX
Analysis of android apk using adhrit by Abhishek J.M
PDF
Understanding evasive hollow process injection techniques monnappa k a
PPTX
Security challenges in d2d communication by ajithkumar vyasarao
PPTX
S2 e (selective symbolic execution) -shivkrishna a
PPTX
Dynamic binary analysis using angr siddharth muralee
PPTX
Bit flipping attack on aes cbc - ashutosh ahelleya
PDF
Linux Malware Analysis
PDF
ATM Malware: Understanding the threat
PPTX
XXE - XML External Entity Attack
PPT
Image (PNG) Forensic Analysis
Understanding Malware Persistence Techniques by Monnappa K A
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Emerging Trends in Cybersecurity by Amar Prusty
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
Closer look at PHP Unserialization by Ashwin Shenoi
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
The Art of Executing JavaScript by Akhil Mahendra
Reversing and Decrypting Malware Communications by Monnappa
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Analysis of android apk using adhrit by Abhishek J.M
Understanding evasive hollow process injection techniques monnappa k a
Security challenges in d2d communication by ajithkumar vyasarao
S2 e (selective symbolic execution) -shivkrishna a
Dynamic binary analysis using angr siddharth muralee
Bit flipping attack on aes cbc - ashutosh ahelleya
Linux Malware Analysis
ATM Malware: Understanding the threat
XXE - XML External Entity Attack
Image (PNG) Forensic Analysis

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Mushroom cultivation and it's methods.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
1. Introduction to Computer Programming.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Mushroom cultivation and it's methods.pdf
A comparative analysis of optical character recognition models for extracting...
Assigned Numbers - 2025 - Bluetooth® Document
1. Introduction to Computer Programming.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Web App vs Mobile App What Should You Build First.pdf
A Presentation on Artificial Intelligence
OMC Textile Division Presentation 2021.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A Presentation on Touch Screen Technology
Enhancing emotion recognition model for a student engagement use case through...
Hindi spoken digit analysis for native and non-native speakers
NewMind AI Weekly Chronicles - August'25-Week II
Group 1 Presentation -Planning and Decision Making .pptx
Tartificialntelligence_presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx

Homomorphic encryption

  • 2. Private Search Delegate PROCESSING of data without giving away ACCESS to it ► You: Encrypt the query, send to Google (Google does not know the key, cannot “see” the query) ► Google: Encrypted query → Encrypted results (You decrypt and recover the search results) 2 of 32
  • 3. Private Cloud Computing Delegate PROCESSING of data without giving away ACCESS to it (Input: x) (Program: P) Enc(x), P → Enc(P(x)) Encrypt x 3 of 32
  • 4. A form of encryption which allows specific types of computations to be carried out on ciphertext and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. What is homomorphic encryption?
  • 6. Different types of HE - Partially Homomorphic - (Additively or Multiplicatively) - RSA - ElGamal - Paillier - Fully Homomorphic - Gentry’s System
  • 7. Applications - E-voting - Biometric verification - Protection of mobile agent - Lottery protocol
  • 9. A Symmetric Homomorphic Encryption Scheme over Integers Shared key: odd integer p ● To encrypt a bit m: Choose at random large q, small r (|r| < p/2) Cipher c = pq + 2r + m [ Ciphertext is close to a multiple of p ] ● To decrypt c: Message m = (c mod p) mod 2
  • 10. How is it homomorphic? Homomorphic Addition c1 = q1p + 2r1 + m1 c2 = q2p + 2r2 + m2 c1 + c2 = (q1 + q2)p + 2(r1 + r2) + (m1 + m2) c’ = q’p + 2 r’ + m’
  • 11. How is it homomorphic? Homomorphic Multiplication c1 = q1p + 2r1 + m1 c2 = q2p + 2r2 + m2 c1 *c2 =(c1q2+q1c2q1q2)p + 2(2r1r2 + r1m2 + m1r2) + m1m2 c’ = q’p + 2 r’ + m’
  • 12. Paillier Encryption - Pascal Paillier in 1999 - Probabilistic algorithm - Additively homomorphic system m = plaintext, c = ciphertext E(m) is encryption of m, D(c) is decryption of c D(E(m1) E(m2)) = m1 + m2