Theoretical Framework and Application Exploration of Fully Homomorphic Encryption
DOI:
https://doi.org/10.54097/spqrwf02Keywords:
Fully Homomorphic Encryption, Development History, Main Algorithms.Abstract
With the rapid development of big data and cloud computing, the issues of data privacy and security have gradually attracted widespread attention worldwide. Fully Homomorphic Encryption (FHE), as one of the key technologies for solving privacy computing problems, can perform addition and multiplication operations in the encrypted state, thereby enabling effective computation while ensuring data privacy. This paper reviews the theoretical framework and application exploration of FHE. Firstly, it comprehensively summarizes the theoretical basis, development history, and key mathematical tools of FHE, and focuses on analyzing the algorithm principles and latest progress of mainstream schemes such as Brakerski-Fan-Vercauteren (BFV), Cheon-Kim-Kim-Song (CKKS), and Torus FHE (TFHE). It explores the application potential of FHE in fields such as machine learning, medical health, and cloud computing, and analyzes the core challenges it faces, including performance bottlenecks, bootstrapping overhead, and multi-user management. Finally, it looks forward to future research directions such as the integration of FHE and AI, and the construction of cross-domain privacy computing platforms, emphasizing the significant importance of FHE in promoting the two-way advancement of data security and privacy protection.
Downloads
References
[1] Bai Lifang, Zhu Yuefei, Li Yongjun, Wang Shuai, Yang Xiaoqi. Research progress of fully homomorphic encryption. Journal of Computer Research and Development, 2024, 61 (12): 3069 - 3087.
[2] Dai Yiran, Zhang Jiang, Xiang Binwu, Deng Yi. Overview on the research status and development route of fully homomorphic encryption technology. Journal of Electronics & Information Technology, 2024, 46 (5): 1774 - 1789.
[3] Marcolla C, Sucasas V, Manzano M, et al. Survey on fully homomorphic encryption, theory, and applications. Proceedings of the IEEE, 2022, 110 (10): 1572 - 1609.
[4] Zhang X, Xu C, Jin C, et al. Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme. Future Generation Computer Systems, 2014, 36: 180 - 186.
[5] Dilip G. RETRACTED ARTICLE: An efficient privacy preserving on high-order heterogeneous data using fuzzy K-prototype clustering. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 (5): 5191 - 5203.
[6] Türkoğlu ER, Özcan AŞ, Ayduman C, et al. An accelerated GPU library for homomorphic encryption operations of BFV scheme. 2022 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2022: 1155 - 1159.
[7] Che X, Liu L, Wang B, et al. multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. Journal of King Saud University-Computer and Information Sciences, 2023, 35 (10): 101794.
[8] Naresh VS, Ayyappa D. PPDNN-CRP: CKKS-FHE enabled privacy-preserving deep neural network processing for credit risk prediction. Computational Economics, 2024: 1 - 25.
[9] Chillotti I, Gama N, Georgieva M, et al. TFHE: fast fully homomorphic encryption over the torus. Journal of Cryptology, 2020, 33 (1): 34 - 91.
[10] Boura C, Gama N, Georgieva M, et al. Chimera: combining ring-LWE-based fully homomorphic encryption schemes. Journal of Mathematical Cryptology, 2020, 14 (1): 316 - 338.
[11] Benamira A, Guérand T, Peyrin T, et al. TT-TFHE: a torus fully homomorphic encryption-friendly neural network architecture. arXiv preprint arXiv: 2302.01584, 2023.
[12] Petrean DE, Potolea R. Homomorphic encrypted Yara rules evaluation. Journal of Information Security and Applications, 2024, 82: 103738.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Highlights in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







