Asked On Quora : How does fully homomorphic encryption really work?

in cryptography •  5 years ago 

In today's world, individuals are turning out to be more dependent on using other's systems or devices for their storage and computing needs. Clouds, mobile applications and Software as a Service (SaaS) are only a couple of examples of uses that depend on other's systems. The vast majority of people understand the need of securing their information in the cloud and depend on using some type of encryption. Unfortunately, encrypted information on a cloud storage using the most of the normal encryption algorithms is not adequate to guarantee privacy of your information.

At the point when you browse, view or edit the information. It is decrypted to plain text or any content and becomes visible to software program. Could you truly know without a doubt who else is not watching your cloud account ? Even on a hardware system, the information can be read directly from CPU registers and data buses by any professional hacker. Here comes the need of Fully Homomorphic Encryption.

Most importantly, usable data encrypted with traditional strategies (like stream and block cipher) must be visible in plain text or any content sooner or later. Another approach to see it is that a man-in-the-middle attack is always a chance and as long as the attacker is innovative with regards to defining where the "middle" is. Does it need to be that way? Consider the possibility that we could manipulate encrypted data while never decrypting it. Turns out that we can.

FHE, yes it’s Fully Homomorphic Encryption is a class of ciphers that have the fascinating quality that an arbitrary calculation on ciphertexts creates an encrypted result which, when decrypted, matches what you would see had similar calculations been performed on the plaintext.

In 2009, Craig Gentry depicted a system that could play out any calculation, but it was slow. Fundamental calculations would take hours! It didn't take long for Gentry and different specialists to think of implementations more quicker. Those systems are finding down to practical uses today. (Craig Gentry got a MacArthur Genius Award for his work on encryption. Click here for His Work in FHE)

Example { Alice may have important information and Bob may have a significant algorithm. Neither needs to reveal their "mystery ingredient" to the other. With traditional encryption techniques, this would not be possible: The algorithm would need to work on plaintext information, average answers for the difficulty include third party support like lawyers.

Alice's grandfather gave her three top secret numbers that will guide directions of the spot where his treasure is covered up. To get the real directions, Alice must add two of the numbers and multiply the third by a constant.

Bob runs a service that can add and multiply encrypted numbers. Alice consents to send Bob her FHE encrypted numbers. Bob will at that point play out the computations on the two numbers while never observing them in plaintext. Computations finished, Bob returns the encrypted outcomes to Alice while never observing the plaintext results. At the point when Alice gets the outcomes, she can basically decrypt them to get the directions. }

Software as a Service is only one application that's a good match for FHE. Other types of applications include smart contracts, block chain systems, data mining. "vanity hashes, end-to-end encrypted database queries, anonymous Identity systems, data integrity verification, and so on. With the rapid development in the field, we can expect many other uses in the very near future.

FHE is currently deployed across several Industries and problem domains, including electronic voting systems, genomics, and payment systems, and we predict widespread adoption in areas such as health care, smart power grids, and finance to take place very soon.

Software as a Service is just a single application for FHE. Different kinds of uses include smart contracts, blockchain systems, data mining. "hashes, end to end encryption database, anonymous Identity frameworks, data integrity etc. With the fast advancement in the field, we can anticipate numerous different uses in the very near future.

FHE is as of now deployed over a few Industries and problem domains, including electronic voting frameworks and payment frameworks.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!