Izenburua
Survey on Fully Homomorphic Encryption, Theory, and ApplicationsEgilea
Egilea (beste erakunde batekoa)
Beste instituzio
Technology Innovation Institute (TII), Abu DhabiSandboxAQ
Technische Universität Dresden
Bertsioa
Postprinta
Eskubideak
© 2022 IEEESarbidea
Sarbide irekiaArgitaratzailearen bertsioa
https://doi.org/10.1109/JPROC.2022.3205665Non argitaratua
Proceedings of the IEEE Vol. 110. N. 10. Pp. 1572-1609. October, 2022Lehenengo orria
1572Azken orria
1609Argitaratzailea
IEEEGako-hitzak
Homomorphic encryption
neural networks
Cloud computing
Public key ... [+]
neural networks
Cloud computing
Public key ... [+]
Homomorphic encryption
neural networks
Cloud computing
Public key
Gaussian distribution
Privacy
Internet of Things [-]
neural networks
Cloud computing
Public key
Gaussian distribution
Privacy
Internet of Things [-]
Laburpena
Data privacy concerns are increasing significantly in the context of the Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by nex ... [+]
Data privacy concerns are increasing significantly in the context of the Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by next-generation networks. Homomorphic encryption addresses privacy challenges by enabling multiple operations to be performed on encrypted messages without decryption. This article comprehensively addresses homomorphic encryption from both theoretical and practical perspectives. This article delves into the mathematical foundations required to understand fully homomorphic encryption ( FHE ). It consequently covers design fundamentals and security properties of FHE and describes the main FHE schemes based on various mathematical problems. On a more practical level, this article presents a view on privacy-preserving machine learning using homomorphic encryption and then surveys FHE at length from an engineering angle, covering the potential application of FHE in fog computing and cloud computing services. It also provides a comprehensive analysis of existing state-of-the-art FHE libraries and tools, implemented in software and hardware, and the performance thereof. [-]