Popular explanation of fully homomorphic encryption wanted

Udhay Shankar N udhay at pobox.com
Tue Jun 16 11:16:24 EDT 2009


from http://en.wikipedia.org/wiki/Homomorphic_encryption :

> The utility of fully homomorphic encryption has been long
> recognized. The problem of constructing such a scheme was first
> proposed within a year of the development of RSA.[1] A solution proved
> more elusive; for more than 30 years, it was unclear whether fully
> homomorphic encryption was even possible. During this period, the best
> result was the Boneh-Goh-Nissim cryptosystem which supports evaluation
> of an unlimited number of addition operations but at most one
> multiplication.
> 
> The question was finally resolved in 2009 with the development of the
> first true fully homomorphic cryptosystem. The scheme, constructed by
> Craig Gentry, employs lattice based encryption and allows evaluation
> of both addition and multiplication operations without restriction.[2]
> 
> References
> 
>    1. ^ R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks
>       and privacy homomorphisms. In Foundations of Secure Computation,
>       1978. 
>    2. ^ Craig Gentry. On homomorphic encryption over circuits of
>       arbitrary depth. In the 41st ACM Symposium on Theory of Computing
>       (STOC), 2009. 

I was wondering if anyone on this list could recommend a good,
entry-level piece on the Gentry paper referenced above, and its
implications. Failing which, anyone wants to take a stab at it?

Udhay

-- 
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list