JOURNAL ARTICLE

An Improved Fully Homomorphic Encryption Scheme for Cloud Computing

Mohd Rizuan BaharonQi ShiMohd Faizal AbdollahS.M. Warusia Mohamed S.M.M. YassinAriff Idris

Year: 2022 Journal:   International Journal of Communication Networks and Information Security (IJCNIS) Vol: 10 (3)   Publisher: Iran University of Science and Technology

Abstract

Business in cloud computing is very popular among Small and Medium Enterprises (SMEs). By leveraging services from the cloud, such companies can migrate all of their in-house operations to cloud at low costs with minimum IT facility requirements such as desktop machines and the Internet. Even though the cloud promises tremendous advantages in terms of computing resources and storage spaces, some of the companies are still reluctant to adopt such a technology because of security concerns. To overcome such problems, a fully homomorphic encryption (FHE) scheme with improved efficiency can be implemented as the scheme allows computation on encrypted data without decryption. In this paper, we propose an improved FHE scheme that uses a symmetric key for encryption together with a protocol to implement the scheme. Furthermore, we also provide an analysis regarding to the noise growth in the processed ciphertext and squashing technique that is required to reduce the noise. This analysis is essential to improve the efficiency of the scheme as the squashing technique is time-consuming.

Keywords:
Homomorphic encryption Cloud computing Computer science Encryption Scheme (mathematics) Ciphertext Computer security Client-side encryption Key (lock) The Internet Cloud storage Distributed computing Computer network On-the-fly encryption Operating system Mathematics

Metrics

10
Cited By
0.98
FWCI (Field Weighted Citation Impact)
32
Refs
0.73
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Coding theory and cryptography
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.