Fully Homomorphic Encryption Scheme Over Integers Based on DGHV Scheme

Zainab H. Mahmood, Mahmood K. Ibrahem


Homomorphic encryption was introduced to enable untrusted parties to apply computation over encrypted data, without decrypting the message. It makes a promising future to solve security challenges with Cloud Computing.  Still, because of complex problems, HE is not yet usable in real-world applications. However homomorphic encryption suffers from many complex issues like large-time computation, which is difficult to implement, and huge ciphertext size. In this paper, we take into account many vital homomorphic encryption schemes, all of them is depend on computing over integers, by converting the message to a binary format, then the ciphertext is calculated to every single bit of plaintext. So, we suggested another symmetric Fully Homomorphic encryption that depends on an integer number without converting it to binary format, it encrypts the message using a prime secret key. The proposed system is considered a great improvement to the DGHV system. Where it reduced the ciphertext size and the execution time significantly. The present proposed system shows an improvement of DGHV where it is faster about 23.8 times from DGHV, and we gain one ciphertext for the whole message instead of ciphertext for every bit of the message. The scheme's hardness depends on the greatest common divisor (GCD) problem. We present a detailed explanation of these schemes showing their efficient techniques and compare it with the proposed algorithm in terms of ciphertext size of algorithm, and execution time and analyze their security them finally draw several conclusions.


Data Privacy of Cloud Computing; Fully Homomorphic Encryption; DGHV; GCD

Full Text:



M. L. Gaid and S. A. Salloum, "Homomorphic encryption," The International Conference on Artificial Intelligence and Computer Vision, vol. 1377, pp. 634-642, 2021, https://doi.org/10.1007/978-3-030-76346-6_56.

S. L. Nita and M. I. Mihailescu, "Homomorphic Encryption," Advances to Homomorphic and Searchable Encryption, pp. 27-88, 2023, https://doi.org/10.1007/978-3-031-43214-9_3.

W. Yang, S. Wang, H. Cui, Z. Tang, and Y. Li, "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics," Sensors, vol. 23, no. 7, p. 3566, 2023, https://doi.org/10.3390/s23073566.

A. Ali, B. A. S. Al-Rimy, F. S. Alsubaei, A. A. Almazroi, and A. A. Almazroi, "HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications," Sensors, vol. 23, no. 15, p. 6762, 2023, https://doi.org/10.3390/s23156762.

Y. Ameur and S. Bouzefrane, "Handling security issues by using homomorphic encryption in multi-cloud environment," Procedia Computer Science, vol. 220, pp. 390-397, 2023, https://doi.org/10.1016/j.procs.2023.03.050.

C. Aguilar-Melchor, S. Fau, C. Fontaine, G. Gogniat and R. Sirdey, "Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain," IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 108-117, 2013, https://doi.org/10.1109/MSP.2012.2230219.

R. Podschwadt, D. Takabi, P. Hu, M. H. Rafiei and Z. Cai, "A Survey of Deep Learning Architectures for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption," IEEE Access, vol. 10, pp. 117477-117500, 2022, https://doi.org/10.1109/ACCESS.2022.3219049.

B. Seth, S. Dalal, and R. Kumar, "Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage," Recent Advances in Computational Intelligence, vol. 823, pp. 71-92, 2019, https://doi.org/10.1007/978-3-030-12500-4_5.

F. Thabit, O. Can, S. Alhomdy, G. H. Al-Gaphari, and S. Jagtap, "A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing," International Journal of Intelligent Networks, vol. 3, pp. 16-30, 2022, https://doi.org/10.1016/j.ijin.2022.04.001.

I. Amorim and I. Costa, "Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis," Mathematics, vol. 11, no. 13, p. 2948, 2023, https://doi.org/10.3390/math11132948.

A. V. Kumar, K. Bhavana and C. Yamini, "Fully Homomorphic Encryption for Data Security Over Cloud," 2022 6th International Conference on Electronics, Communication and Aerospace Technology, pp. 782-787, 2022, https://doi.org/10.1109/ICECA55336.2022.10009404.

S. Nithya, V. Seethalakshmi, G. Vetrichelvi, M. Siva Sangari, and G. Basavaraj, "A Survey on Private Keyword Sorting and Searching Homomorphic Encryption," Homomorphic Encryption for Financial Cryptography, pp. 259-275, 2023, https://doi.org/10.1007/978-3-031-35535-6_12.

P. Chaudhary, R. Gupta, A. Singh and P. Majumder, "Analysis and Comparison of Various Fully Homomorphic Encryption Techniques," 2019 International Conference on Computing, Power and Communication Technologies (GUCON), pp. 58-62, 2019, https://ieeexplore.ieee.org/abstract/document/8940577.

Y. Shoukry et al., "Privacy-aware quadratic optimization using partially homomorphic encryption," 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 5053-5058, 2016, https://doi.org/10.1109/CDC.2016.7799042.

N. Naqvi, A.T. Abbasi, R. Hussain, et al., "Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach," Wireless Personal Communications, vol. 103, pp. 1563-1585, 2018, https://doi.org/10.1007/s11277-018-5868-1.

X. Sun, P. Zhang, J. K. Liu, J. Yu and W. Xie, "Private Machine Learning Classification Based on Fully Homomorphic Encryption," in IEEE Transactions on Emerging Topics in Computing, vol. 8, no. 2, pp. 352-364, 2020, https://doi.org/10.1109/TETC.2018.2794611.

A. A. Ahmed, M. M. Madboly, and S. K. Guirguis, "Securing Data Transmission and Privacy Preserving Using Fully Homomorphic Encryption," International Journal of Intelligent Engineering & Systems, vol. 16, no. 1, pp. 277-289, 2023, https://doi.org/10.22266/ijies2023.0228.25.

X. Sun, F. R. Yu, P. Zhang, W. Xie, and X. Peng, "A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks," Sensors, vol. 20, no. 15, p. 4253, 2020, https://doi.org/10.3390/s20154253.

K. Munjal and R. Bhatia, "A systematic review of homomorphic encryption and its contributions in the healthcare industry," Complex Intelligent Systems, vol. 9, pp. 3759-3786, 2023, https://doi.org/10.1007/s40747-022-00756-z.

R. Huang, Z. Li, and J. Zhao, "A Verifiable Fully Homomorphic Encryption Scheme," Security, Privacy, and Anonymity in Computation, Communication, and Storage, vol. 11611, pp. 412-426, 2019, https://doi.org/10.1007/978-3-030-24907-6_31.

C. Gentry, "Fully homomorphic encryption using ideal lattices," Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169-178, 2009, https://doi.org/10.1145/1536414.1536440.

N. P. Smart and F. Vercauteren, "Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes," Public Key Cryptography – PKC 2010, vol. 6056, pp. 420-443, 2010, https://doi.org/10.1007/978-3-642-13013-7_25.

P. -C. Chen, T. -H. Kuo and J. -L. Wu, "A Study of the Applicability of Ideal Lattice-Based Fully Homomorphic Encryption Scheme to Ethereum Blockchain," IEEE Systems Journal, vol. 15, no. 2, pp. 1528-1539, 2021, https://doi.org/10.1109/JSYST.2021.3064053.

C. Bonte, I. Iliashenko, J. Park, H. V. Pereira, N. P. Smart, “Final: Faster fhe instantiated with ntru and lwe,” International Conference on the Theory and Application of Cryptology and Information Security, vol. 13792, pp. 188-215, 2022, https://doi.org/10.1007/978-3-031-22966-4_7.

J. H. Cheon and D. Stehlé, "Fully Homomorphic Encryption over the Integers Revisited," Advances in Cryptology -- EUROCRYPT 2015, vol. 9056, p. 513, 536, 2015, https://doi.org/10.1007/978-3-662-46800-5_20.

C. Gentry, A. Sahai, and B. Waters, "Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based," Advances in Cryptology – CRYPTO 2013, vol. 8042, 2013, pp. 75-92, https://doi.org/10.1007/978-3-642-40041-4_5.

K. Kluczniak, "NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus," Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 1783-1797, 2022, https://doi.org/10.1145/3548606.3560700.

L. Dong, S. Chen, Y. Cheng, Z. Wu, C. Li, H. Wu, "Measuring economic activity in China with mobile big data," EPJ Data Science, vol. 6, no. 29, pp. 1-17, 2017, https://doi.org/10.1140/epjds/s13688-017-0125-5.

Y. Li, "Review on Nuida-Kurosawa Fully Homomorphic Encryption in Client-server Computing Scenario," International Journal of Electronics and Information Engineering, vol. 11, no. 1, pp. 16-24, 2019, http://ijeie.jalaxy.com.tw/contents/ijeie-v11-n1/ijeie-2019-v11-n1-p16-24.pdf.

J. Zhao, R. Huang, and B. Yang, "Efficient GSW-Style Fully Homomorphic Encryption over the Integers," Security and Communication Networks, vol. 2021, pp. 1-13, https://doi.org/10.1155/2021/8823787.

Z. H. Mahmood and M. K. Ibrahem, "Hardware Implementation of an Encryption for Enhancement DGHV," Iraqi Journal of Information and Communication Technology, vol. 2, no. 2, pp. 44-57, 2019, https://doi.org/10.31987/ijict.2.2.69.

DOI: https://doi.org/10.59247/csol.v1i3.45


  • There are currently no refbacks.

Copyright (c) 2023 Zainab H. Mahmood, Mahmood K. Ibrahem


Control Systems and Optimization Letters
ISSN: 2985-6116
Website: https://ejournal.csol.or.id/index.php/csol
Email: alfian_maarif@ieee.org
Address: Jl. Empu Sedah No. 12, Pringwulung, Condongcatur, Kec. Depok, Kabupaten Sleman, Daerah Istimewa Yogyakarta 55281, Indonesia