Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Homomorphic encryption and applications
Yi X., Paulet R., Bertino E., Springer Publishing Company, Incorporated, New York, NY, 2014. 126 pp. Type: Book (978-3-319122-28-1)
Date Reviewed: Apr 8 2015

Fully homomorphic encryption is one of the most exciting results in cryptography of the last few years. It allows for arbitrary computations to be carried out on ciphertext to produce an encrypted result that, when decrypted, matches the result of the same computation performed on the corresponding plaintext. This is a very desirable feature in many modern communication system architectures. It allows one, for example, to chain together several services without having to disclose the data that these services operate on to any of them. Natural applications are also in cloud computing applications to allow for computations on encrypted data while protecting, at all times, the confidentiality of the data.

This book presents the basic homomorphic encryption techniques and their applications. The book begins in chapter 1 with a brief historical overview of classic ciphers, and secret key and public key encryption schemes. Chapter 2 discusses four different partially homomorphic encryption schemes. Fully homomorphic encryption schemes are presented in chapter 3. The remaining chapters discuss applications of other homomorphic encryption schemes: a remote end-to-end voting scheme (chapter 4), nearest neighbor queries with location privacy (chapter 5), and private searching on streaming data (chapter 6).

This is a short book that provides a quick overview of this topic. It is best suited for undergraduate students in computer science or mathematics with a basic background in cryptography who have taken a course in abstract algebra. For researchers, however, the book lacks sufficient detail. Most readers will also likely want to skip chapter 1, which discusses very basic background material; in addition, with its color figures, it is visually disconnected from the rest of the book.

Overall, I can recommend this book as a general reference for possible independent study.

Reviewer:  Burkhard Englert Review #: CR143319 (1507-0548)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy