Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Homomorphic Encryption and its Application to Blockchain

View through CrossRef
The concept, method, algorithm and application of the advanced field of cryptography, homomorphic encryption, as well as its application to the field of blockchain are discussed in this paper. There are various forms of homomorphic encryption and they can be classified into three categories: partially homomorphic encryption, hierarchical homomorphic encryption and fully homomorphic encryption. We explain the concept, method and algorithm for each category with down to earth examples. The milestone example of RSA algorithm is explained which is still widely used in the internet and in blockchain as well. Applications of homomorphic encryption depends on efficiency of implementation which has been in good progress in recent years.
Title: Homomorphic Encryption and its Application to Blockchain
Description:
The concept, method, algorithm and application of the advanced field of cryptography, homomorphic encryption, as well as its application to the field of blockchain are discussed in this paper.
There are various forms of homomorphic encryption and they can be classified into three categories: partially homomorphic encryption, hierarchical homomorphic encryption and fully homomorphic encryption.
We explain the concept, method and algorithm for each category with down to earth examples.
The milestone example of RSA algorithm is explained which is still widely used in the internet and in blockchain as well.
Applications of homomorphic encryption depends on efficiency of implementation which has been in good progress in recent years.

Related Results

Development Paillier's library of fully homomorphic encryption
Development Paillier's library of fully homomorphic encryption
One of the new areas of cryptography considered-homomorphic cryptography. The article presents the main areas of application of homomorphic encryption. An analysis of existing deve...
Power of Homomorphic Encryption in Secure Data Processing
Power of Homomorphic Encryption in Secure Data Processing
Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. This paper presents a detailed discuss...
Convergence and representation of blockchain and smart contracts using the semantic web
Convergence and representation of blockchain and smart contracts using the semantic web
The Internet and the World Wide Web were designed with the intention of being decentralised and interoperable, and therefore more democratic, where users have power over their data...
La qualification de la blockchain
La qualification de la blockchain
La création de la blockchain a remis en question les notions traditionnelles de collaboration et d'échange. Cette thèse vise à démontrer que cette innovation n'est pas seulement te...
Anomaly Detection in Blockchain Using Machine Learning
Anomaly Detection in Blockchain Using Machine Learning
Blockchain technology has gained significant attention as a secure and decentralized platform for various applications. However, the immutable and distributed nature of blockchain ...
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To addres...
Enhanced Homomorphic Encryption for Cloud Security Through Individual Optimization
Enhanced Homomorphic Encryption for Cloud Security Through Individual Optimization
Cloud computing is susceptible to a wide range of security issues since it is decentralized. Inappropriate actors may take advantage of these vulnerabilities. Using a method known ...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...

Back to Top