Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A NEW ROBUST HOMOMORPHIC ENCRYPTION SCHEME BASED ON PAILLIER, RESIDUE NUMBER SYSTEM AND EL-GAMAL

View through CrossRef
The new focus of cryptographic research is on encryption schemes that can withstand cyber-attacks, with the arrival of cloud computing. The widely used public key encryption system designed by Taher El Gamal based on the discrete logarithm problem has been used in many sectors such as internet security, E-voting systems, and other applications for a long time. However, considering the potential data security threats in cloud computing, cryptologists are developing new and more robust cryptographic algorithms. To this end, a new robust homomorphic encryption scheme based on Paillier, Residue Number system (RNS), and El Gamal (PRE), is proposed in this paper., which is expected to be highly effective and resistant to cyber-attacks. The proposed scheme is composed a three-layer encryption and a three-layer decryption processes thereby, making it robust. It employs an existing RNS moduli set {2n + 1, 2n, 2n − 1, 2n−1} − 1}, having passed it through the Paillier encryption process for forward conversion and then the El Gamal cryptosystem to encrpyt any data. The decryption process is a reversal of these processes starting from the El Gamal through a reverse conversion with the same moduli set using the Chinese Remainder Theorem (CRT). The simulation results shows that the proposed scheme outperforms similar existing schemes in terms of robustness and therefore, making it more secured which however, trades off with the time of execution in similar comparison.
Title: A NEW ROBUST HOMOMORPHIC ENCRYPTION SCHEME BASED ON PAILLIER, RESIDUE NUMBER SYSTEM AND EL-GAMAL
Description:
The new focus of cryptographic research is on encryption schemes that can withstand cyber-attacks, with the arrival of cloud computing.
The widely used public key encryption system designed by Taher El Gamal based on the discrete logarithm problem has been used in many sectors such as internet security, E-voting systems, and other applications for a long time.
However, considering the potential data security threats in cloud computing, cryptologists are developing new and more robust cryptographic algorithms.
To this end, a new robust homomorphic encryption scheme based on Paillier, Residue Number system (RNS), and El Gamal (PRE), is proposed in this paper.
, which is expected to be highly effective and resistant to cyber-attacks.
The proposed scheme is composed a three-layer encryption and a three-layer decryption processes thereby, making it robust.
It employs an existing RNS moduli set {2n + 1, 2n, 2n − 1, 2n−1} − 1}, having passed it through the Paillier encryption process for forward conversion and then the El Gamal cryptosystem to encrpyt any data.
The decryption process is a reversal of these processes starting from the El Gamal through a reverse conversion with the same moduli set using the Chinese Remainder Theorem (CRT).
The simulation results shows that the proposed scheme outperforms similar existing schemes in terms of robustness and therefore, making it more secured which however, trades off with the time of execution in similar comparison.

Related Results

Development Paillier's library of fully homomorphic encryption
Development Paillier's library of fully homomorphic encryption
One of the new areas of cryptography considered-homomorphic cryptography. The article presents the main areas of application of homomorphic encryption. An analysis of existing deve...
Secure PUF-Based Authentication Systems
Secure PUF-Based Authentication Systems
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address ...
Power of Homomorphic Encryption in Secure Data Processing
Power of Homomorphic Encryption in Secure Data Processing
Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. This paper presents a detailed discuss...
Homomorphic Encryption and its Application to Blockchain
Homomorphic Encryption and its Application to Blockchain
The concept, method, algorithm and application of the advanced field of cryptography, homomorphic encryption, as well as its application to the field of blockchain are discussed in...
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To addres...
Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace
Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace
With the advent of the intelligent era, more and more artificial intelligence algorithms are widely used and a large number of user data are collected in the cloud server for shari...
Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption
Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption
Abstract Face recognition is playing an increasingly important role in present society, and suffers from the privacy leakage in plaintext. Therefore, a recognition system b...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...

Back to Top