Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Homomorphic encryption and applications
Yi X., Paulet R., Bertino E., Springer Publishing Company, Incorporated, New York, NY, 2014. 126 pp. Type: Book (978-3-319122-28-1)
Date Reviewed: May 27 2015

Nowadays most information is exchanged in electronic form. This warrants several cryptographic functions such as confidentiality, integrity, authentication, and availability. In order to perform these functions, various cryptographic operations--such as encryption and hashing--are required. Encryption is the commonly used operation for providing cryptographic applications. Homomorphic encryption is a special type through which users can perform operations on the encrypted text that are similar to performing the operations on plain text. Since large numbers of applications are in the cloud, this type of encryption is the need of the hour.

This brief, 126-page book comprehensively presents various homomorphic encryption algorithms and their applications nicely. Though it is a brief book, it has an excellent introductory chapter, which provides a quick and decent overview of various classical encryption algorithms. I like the way the authors present these algorithms--compact, yet complete! They are illustrated with numerical examples to offer better clarity to readers. Hats off to the authors for neatly presenting these classical algorithms within 24 pages.

This book contains six chapters. The second and third chapters provide various homomorphic encryption algorithms, brilliantly using numerical examples. In addition to that, the authors have analyzed security and implementation aspects of these algorithms. These two chapters help the readers choose homomorphic encryption algorithms based on their requirements.

The last three chapters have three applications:(1) a remote end-to-end voting scheme, (2) nearest neighbor queries with location privacy, and (3) private searching on streaming data. All three applications are presented with suitable algorithms, and their performances are also analyzed neatly.

I would recommend this book as a reference for senior undergraduate and graduate students. Researchers and practitioners working in cryptography will also find it useful.

Reviewer:  S. Ramakrishnan Review #: CR143473 (1508-0664)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy