Comparative Analysis of Homomorphic Encryption Based on Elliptic Curves over Rings

Data security in the cloud can be achieved through encryption. However, if processing encrypted messages still requires decryption, there is a risk that decryption keys could be obtained by attackers. Homomorphic encryption offers a solution by allowing the processing of encrypted data without the n...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Informatics, Multimedia, Cyber and Information System (Online) pp. 327 - 333
Main Authors Wijaya, Muhammad Haidar, Carita, Sa'aadah S, Rosdiana, Sri, Ardyani, Mareta Wahyu
Format Conference Proceeding
LanguageEnglish
Published IEEE 20.11.2024
Subjects
Online AccessGet full text
ISSN2837-5203
DOI10.1109/ICIMCIS63449.2024.10956834

Cover

More Information
Summary:Data security in the cloud can be achieved through encryption. However, if processing encrypted messages still requires decryption, there is a risk that decryption keys could be obtained by attackers. Homomorphic encryption offers a solution by allowing the processing of encrypted data without the need for decryption. There are three main categories of homomorphic encryption: partial homomorphic encryption (PHE), somewhat homomorphic encryption (SWHE), and fully homomorphic encryption (FHE). Among these, PHE is preferred when cost efficiency, lower storage requirements, and better data processing speed are needed. Homomorphic encryption can be implemented using various algorithms, including symmetric key algorithms and public key algorithms. Elliptic curve algorithms, a type of public key algorithm, provide efficiency with smaller key sizes while maintaining security levels comparable to integer-based algorithms like RSA. In this study, elliptic curves operating over algebraic ring structures are used to enhance the security of the PHE algorithm. Three quotient rings were successfully implemented in the PHE algorithm, and performance analysis was conducted. The performance analysis indicates that encryption execution time increases with larger generated random values and the number of messages. Decryption execution time also increases with larger private key sizes and the number of messages. Furthermore, the analysis of time differences between the three elliptic curves in encryption and decryption processes shows that the differences are not significant.
ISSN:2837-5203
DOI:10.1109/ICIMCIS63449.2024.10956834