Homomorphic Encryption: What is and Known Applications

Written by Anastasios Arampatzis

Every day, organizations handle a lot of sensitive information, such as personal identifiable information (PII) and financial data, that needs to be encrypted both when it is stored (data at rest) and when it is being transmitted (data in transit). Although modern encryption algorithms are virtually unbreakable, at least until the coming of quantum computing, because they require too much processing power too break them that makes the whole process too costly and time-consuming to be feasible, it is also impossible to process the data without first decrypting it. And decrypting data, makes it vulnerable to hackers.

The problem with encrypting data is that sooner or later, you have to decrypt it. You can keep your cloud files cryptographically scrambled using a secret key, but as soon as you want to actually do something with those files, anything from editing a word document or querying a database of financial data, you have to unlock the data and leave it vulnerable. Homomorphic encryption, an advancement in the science of cryptography, could change that.

What is Homomorphic Encryption?

The purpose of homomorphic encryption is to allow computation on encrypted data. Thus data can remain confidential while it is processed, enabling useful tasks to be accomplished with data residing in untrusted environments. In a world of distributed computation and heterogeneous networking this is a hugely valuable capability.

A homomorphic cryptosystem is like other forms of public encryption in that it uses a public key to encrypt data and allows only the individual with the matching private key to access its unencrypted data. However, what sets it apart from other forms of encryption is that it uses an algebraic system to allow you or others to perform a variety of computations (or operations) on the encrypted data.

In mathematics, homomorphic describes the transformation of one data set into another while preserving relationships between elements in both sets. The term is derived from the Greek words for “same structure.” Because the data in a homomorphic encryption scheme retains the same structure, identical mathematical operations, whether they are performed on encrypted or decrypted data, will result in equivalent results.

Finding a general method for computing on encrypted datahad been a goal in cryptography since it was proposed in 1978 by Rivest, Adleman and Dertouzos. Interest in this topic is due to its numerous applications in the real world. The development of fully homomorphic encryption is a revolutionary advance, greatly extending the scope of the computations which can be applied to process encrypted data homomorphically. Since Craig Gentry published his idea in 2009, there has been huge interest in the area, with regard to improving the schemes, implementing them and applying them.

Types of Homomorphic Encryption

There are three types of homomorphic encryption. The primary difference between them is related to the types and frequency of mathematical operations that can be performed on the ciphertext. The three types of homomorphic encryption are:

  • Partially Homomorphic Encryption
  • Somewhat Homomorphic Encryption
  • Fully Homomorphic Encryption

Partially homomorphic encryption (PHE) allows only select mathematical functions to be performed on encrypted values. This means that only one operation, either addition or multiplication, can be performed an unlimited number of times on the ciphertext. Partially homomorphic encryption with multiplicative operations is the foundation for RSA encryption, which is commonly used in establishing secure connections through SSL/TLS.

A somewhat homomorphic encryption (SHE) scheme is one that supports select operation (either addition or multiplication) up to a certain complexity, but these operations can only be performed a set number of times.

Fully Homomorphic Encryption

Fully homomorphic encryption (FHE), while still in the development stage, has a lot of potential for making functionality consistent with privacy by helping to keep information secure and accessible at the same time. It was developed from the somewhat homomorphic encryption scheme, FHE is capable of using both addition and multiplication, any number of times and makes secure multi-party computation more efficient. Unlike other forms of homomorphic encryption, it can handle arbitrary computations on your ciphertexts.

The goal behind fully homomorphic encryption is to allow anyone to use encrypted data to perform useful operations without access to the encryption key. In particular, this concept has applications for improving cloud computing security. If you want to store encrypted, sensitive data in the cloud but don’t want to run the risk of a hacker breaking in your cloud account, it provides you with a way to pull, search, and manipulate your data without having to allow the cloud provider access to your data.

Applications of Fully Homomorphic Encryption

Craig Gentry mentioned in his graduation thesis that “Fully homomorphic encryption has numerous applications. For example, it enables private queries to a search engine – the user submits an encrypted query and the search engine computes a succinct encrypted answer without ever looking at the query in the clear. It also enables searching on encrypted data – a user stores encrypted files on a remote file server and can later have the server retrieve only files that (when decrypted) satisfy some boolean constraint, even though the server cannot decrypt the files on its own. More broadly, fully homomorphic encryption improves the efficiency of secure multi party computation.”

Researchers have already identified several practical applications of FHE, some of which are discussed herein:

  • Securing Data Stored in the Cloud. Using homomorphic encryption, you can secure the data that you store in the cloud while also retaining the ability to calculate and search ciphered information that you can later decrypt without compromising the integrity of the data as a whole.
  • Enabling Data Analytics in Regulated Industries. Homomorphic encryption allows data to be encrypted and outsourced to commercial cloud environments for research and data-sharing purposes while protecting user or patient data privacy. It can be used for businesses and organizations across a variety of industries including financial services, retail, information technology, and healthcare to allow people to use data without seeing its unencrypted values. Examples include predictive analysis of medical data without putting data privacy at risk, preserving customer privacy in personalized advertising, financial privacy for functions like stock price prediction algorithms, and forensic image recognition.
  • Improving Election Security and Transparency. Researchers are working on how to use homomorphic encryption to make democratic elections more secure and transparent. For example, the Paillier encryption scheme, which uses addition operations, would be best suited for voting-related applications because it allows users to add up various values in an unbiased way while keeping their values private. This technology could not only protect data from manipulation, it could allow it to be independently verified by authorized third parties

Limitations of Fully Homomorphic Encryption

There are currently two known limitations of FHE. The first limitation is support for multiple users. Suppose there are many users of the same system (which relies on an internal database that is used in computations), and who wish to protect their personal data from the provider. One solution would be for the provider to have a separate database for every user, encrypted under that user’s public key. If this database is very large and there are many users, this would quickly become infeasible.

Next, there are limitations for applications that involve running very large and complex algorithms homomorphically. All fully homomorphic encryption schemes today have a large computational overhead, which describes the ratio of computation time in the encrypted version versus computation time in the clear. Although polynomial in size, this overhead tends to be a rather large polynomial, which increases runtimes substantially and makes homomorphic computation of complex functions impractical.

Implementations of Fully Homomorphic Encryption

Some of the world’s largest technology companies have initiated programs to advance homomorphic encryption to make it more universally available and user-friendly.

Microsoft, for instance, has created SEAL (Simple Encrypted Arithmetic Library), a set of encryption libraries that allow computations to be performed directly on encrypted data. Powered by open-source homomorphic encryption technology, Microsoft’s SEAL team is partnering with companies like IXUP to build end-to-end encrypted data storage and computation services. Companies can use SEAL to create platforms to perform data analytics on information while it’s still encrypted, and the owners of the data never have to share their encryption key with anyone else. The goal, Microsoft says, is to “put our library in the hands of every developer, so we can work together for more secure, private, and trustworthy computing.”

Google also announced its backing for homomorphic encryption by unveiling its open-source cryptographic tool, Private Join and Compute. Google’s tool is focused on analyzing data in its encrypted form, with only the insights derived from the analysis visible, and not the underlying data itself.

Finally, with the goal of making homomorphic encryption widespread, IBM released its first version of its HElib C++ library in 2016, but it reportedly “ran 100 trillion times slower than plaintext operations.” Since that time, IBM has continued working to combat this issue and have come up with a version that is 75 times faster, but it is still lagging behind plaintext operations.

Conclusion

In an era when the focus on privacy is increased, mostly because of regulations such as GDPR, the concept of homomorphic encryption is one with a lot of promise for real-world applications across a variety of industries. The opportunities arising from homomorphic encryption are almost endless. And perhaps one of the most exciting aspects is how it combines the need to protect privacy with the need to provide more detailed analysis. Homomorphic encryption has transformed an Achilles heel into a gift from the gods.

This article was originally published on the Venafi blog at: https://www.venafi.com/blog/homomorphic-encryption-what-it-and-how-it-used.


Letter to Greek ministers for the TERREG text

Today, 09.03.2020, Homo Digitalis sent a letter to the Minister of Civil Protection, the Minister of Justice and the Permanent Representation of Greece in the EU concerning important safeguards that should be taken into account in the TERREG text.

With this letter we underline various provisions in the suggested text, which might be extremely harmful for privacy, freedom of expression and freedom of information.

The said letter is aligned to the positions expressed by European Digital Rights (EDRi) as well as the pertinent Opinion of the EU Fundamental Rights Agency (FRA).


Homo Digitalis interview at Nea Tileorasi Kritis

Giorgos Perrakis, lawyer and Homo Digitalis member, spoke at a TV interview for the protection of digital rights and the activity of our organization.

He underlined particularly the participation of our organization in the event organized in Chania with the aim to educate the teachers regarding personal protection.

We warmly thank Nea Tileorasi Kritis for the excellent hosting and interview.

The full interview is available in Greek here.


Homo Digitalis at 4th Data Protection & Privacy Law Forum

The 4th Law Forum on Data Protection & Privacy took place in Athens on February 26, 2020.

The conference was organized by Palladian Conferences with the support of Homo Digitalis.

Stefanos Vitoratos, vice-president of our organization, represented Homo Digitalis, speaking about the importance of raising awareness of the public in order for data controllers to achieve compliance.

Maria-Alexandra Papoutsi, Vasilis Vasilopoulos and Dimitris Patsos, also members of our organization, participated at the conference, under their professional capacities.

Vasilis Vasilopoulos speaks at the conference


Call to Greek political parties: Reconsideration of the Data Protection Law

On February 24, Homo Digitalis and “EKPIZO” Consumers’ Union sent a joint letter to the Greek Prime Minister and all leaders of the parliamentary political parties, requesting the immediate reconsideration of Law 4624/2019 on data protection.

The necessity for such a reconsideration stems from the Opinion 1/2020, issued by the Greek Data Protection Authority, which found Law 4264/2019 to be in contravention with the GDPR and Directive 2016/680 on various occasions.

The letter was also communicated to the President of the Greek Data Protection Authority, Mr. Konstantinos Menoudakos.

You may read the letter in Greek here.


Homo Digitalis participates in Digital Freedom Fund events

Our organization had the great honour to participate in the strategy meeting and legal actions event on Artificial Intelligence organized by the Digital Freedom Fund on 19-21 February.

We had the chance to meet old fellows and connect with new companions with a view to making new collaborations. Organizations from many countries took part in the events, while Homo Digitalis was the only representative of Greece.

We warmly thank the Digital Freedom Fund for the invitation. It was a pleasure!


Homo Digitalis in the 7th Information Security Conference

On 19 February 2020 the 7th Information Security Conference took place in Evgenidis Foundation in Athens.

The conference was organized by Boussias Communications and with the support of Homo Digitalis.

Mr. Konstantinos Kakavoulis represented our organization, speaking about the importance of information security in our culture. Mr. Kakavoulis underlined that “cybersecure at home means cybersecure at work.”

Three more Homo Digitalis members attended the conference.

Konstantinos Kakavoulis, Elpida Vamvaka, Jim Ntosas and Stergios Konstantinou in the 7th Information Security Conference


Homo Digitalis educates the teachers in Chania

On 14 February Homo Digitalis was invited to speak to the teachers of primary and secondary education in Chania, Crete.

In the morning session, Elpida Vamvaka and Konstantinos Kakavoulis spoke to the teachers regarding the digital footprint and its importance for our digital personality.

They explained in a practical way how the teachers can protect themselves, but also how they can educate their students to gain control of their personal data.

 

In the afternoon session, they spoke to parents and children regarding the right to access and the right to erasure.

 

Elpida Vamvaka explains the right to access

 

Konstantinos Kakavoulis tells the children stories of important personal data breaches

 

Two more Homo digitalis members participated in the seminar, with Anthi Strataki and Dimitris Grammenos, presenting the interactive workshop “GDPR and the 40 thieves”, while Giorgos Perrakis, lawyer and Homo Digitalis member, attended the seminar.

 

The Homo Digitalis team in the seminar


Homo Digitalis starts its collaboration with Sarantaporo.gr

Homo Digitalis and Sarantaporo.gr, the most active wireless communicty network of citizens in Greece, proudly announce their collaboration.

Their common activity shall be directed to the promotion and protection of digital rights, particularly the right to access to internet, in remote areas.

Stefanos Vitoratos and Vassilis Chryssos signing the Memorandum of Understanding for Homo Digitalis and Sarantaporo.gr

According to a recent survey, only 78,5% of Greeks have access to the internet, thus meaning that 2,5 million citizens live digitally excluded.

This partially comes as a result of the fact that the level of internet service is low, in remote areas with small population; these areas remain excluded because there is no interest by the internet service providers to invest there.

Sarantaporo.gr is a wireless community network working towards the elimination of this digital exclusion. It operates in 11 villages in the area of the Elassona Municipality, providing internet access to 3,500 people. Its operation is based on the participation of the internet users in the creation and maintenance of the network.

This project recently won the first prize in the European Broadband Awards 2019 by the European Commission.

The two prominent civil society organizations decided to work together to propose measures to the Greek State, which shall enhance the level of internet access and provide for actual enjoyment of digital rights for the people residing in the Greek territory.

The members of the two organizations during the signature of the MoU