Analysis and Comparison of Fully Homomorphic Encryption Approaches Over Integers

2022-2-10
Bozkurt, Cansu
The time period after the mid-20th century was named as information age or digital age. In that age, the world is being digitalized very fastly. The amount of data transferred and processed online is increasing rapidly. As a result, data protection became an essential topic for researchers. To process or make a computation on the encrypted data deciphering ciphertext first causes a security flaw. Homomorphic encryption (HE) algorithms were designed to make computations on data without deciphering it. However, HE algorithms are able to work for a limited amount of processing steps. Fully homomorphic encryption (FHE) algorithms are developed to solve this problem. It is feasible to apply any accurately calculable operation on encrypted data. This thesis presents definitions, properties, applications of FHE. Some constructions of FHE schemes based on the integers are also analyzed. Furthermore, the computational complexity of two algorithms, namely the DGHV scheme and Batch DGHV scheme has been computed, and their efficiency is compared based on the complexities. While the DGHV scheme encrypts the one-bit message, the batch DGHV scheme encrypts an ℓ-bit message vector m at a time. The primary purpose is to research which option is more efficient for encrypting l-bit messages. The first option is to use the DGHV scheme for l-times. The second option is to use the batch DGHV scheme one time. We conclude that for message size l when security parameter l ≤ λ^3/2 using the batch scheme is more efficient than using DGHV scheme.

Suggestions

Analysis of sinusoidal and helical buckling of drill string in horizontal wells using finite element method
Arpacı, Erdoğan; Özbayoğlu, Evren; Department of Petroleum and Natural Gas Engineering (2009)
The number of horizontal wells is increasing rapidly in all over the world with the growth of new technological developments. During horizontal well drilling, much more complex problems occur when compared with vertical well drilling, such as decrease in load transfer to the bit, tubular failure, tubular fatigue and tubular lock-up. This makes selection of appropriate tubular and making the right drill string design more important. As the total compression load on the horizontal section increases, the behav...
Financial Development of the Waqfs in Konya and the Agricultural Economy in the Central Anatolia (Late Sixteenth-Early Seventeenth Centuries)
Orbay, Kayhan (Brill, 2012-01-01)
This study examines the financial history of three waqfs (those of Mevlana Celaleddin-i Rumi, Sadreddin-i Konevi, and Selim II) in Konya through their account records covering the late sixteenth and early seventeenth centuries. These waqfs (charitable foundations) had large agricultural holdings, and their financial developments consequently reflect the local agricultural conditions in central Anatolia. This analysis of the waqf account books deals with the short-term financial difficulties resulting from h...
On the ntru public key cryptosystem
Çimen, Canan; Çakçak, Emrah; Department of Cryptography (2008)
NTRU is a public key cryptosystem, which was first introduced in 1996. It is a ring-based cryptosystem and its security relies on the complexity of a well-known lattice problem, i.e. shortest vector problem (SVP). There is no efficient algorithm known to solve SVP exactly in arbitrary high dimensional lattices. However, approximate solutions to SVP can be found by lattice reduction algorithms. LLL is the first polynomial time algorithm that finds reasonable short vectors of a lattice. The best known attacks...
Differential cryptanalysis on LBLOCK using differential factors
Öğünç, Merve; Doğanaksoy, Ali; Tezcan, Cihangir; Department of Cryptography (2018)
Cryptography had actually a long history and comes to today by evolving day by day. Now, it is a huge area in terms of the applications in industry and research topics in academia. Even if we do not realize, the cryptographic tools are placed in every single day of our life. To protect the information, the cryptographic algorithm is used in several areas from the basic website to smart devices. One of the classes of cryptographic algorithm is symmetric-key algorithms which cover block ciphers and stream cip...
Tarsus Şer’iyye Sicillerinde Yer Alan Konut Tanımları Üzerinden Değerlendirmeler
Uçar, Meltem (Middle East Technical University Faculty of Architecture, 2021-12-01)
Osmanlı Dönemi’nden günümüze ulaşan geleneksel konut yapıları çoğunlukla 19. yy sonu ve 20. yy başına tarihlenmektedir. Mevcut geleneksel konut araştırmaları çoğunlukla Osmanlı’nın son dönemine tarihlenen ve günümüze ulaşabilen tarihi konut yapılarının fiziksel biçimlenmesinden elde edilen bilgilere ve bu bilgilere dayalı değerlendirmelere dayalıdır. Bununla birlikte şer’iyye sicilleri, vakfiyeler, defterler ve belgeler gibi birinci dereceden güvenilir kaynaklar bazen doğrudan bazen de dolaylı olarak ait ol...
Citation Formats
C. Bozkurt, “Analysis and Comparison of Fully Homomorphic Encryption Approaches Over Integers,” M.S. - Master of Science, Middle East Technical University, 2022.