Device Authentication using Homomorphic Encryption
by Supriya Yadav1,* , Gareth Howells2
1 School of Engineering & Digital Arts, University of Kent, Canterbury, CT2 7NB, United Kingdom
2 School of Computing, University of Kent, Canterbury, CT2 7NB, United Kingdom
* Author to whom correspondence should be addressed.
Journal of Engineering Research and Sciences, Volume 2, Issue 10, Page # 1-8, 2023; DOI: 10.55708/js0210001
Keywords: Data Security, Device Authentication, Homomorphic Encryption, Encrypted Data, CKKS
Received: 02 August 2023, Revised: 27 August 2023, Accepted: 05 November 2023, Published Online: 30 October 2023
APA Style
Yadav, S., & Howells, G. (2023). Device Authentication using Homomorphic Encryption. Journal of Engineering Research and Sciences, 2(10), 1–8. https://doi.org/10.55708/js0210001
Chicago/Turabian Style
Yadav, Supriya, and Gareth Howells. “Device Authentication using Homomorphic Encryption.” Journal of Engineering Research and Sciences 2, no. 10 (October 1, 2023): 1–8. https://doi.org/10.55708/js0210001.
IEEE Style
S. Yadav and G. Howells, “Device Authentication using Homomorphic Encryption,” Journal of Engineering Research and Sciences, vol. 2, no. 10, pp. 1–8, Oct. 2023, doi: 10.55708/js0210001.
In the digital era, data security in files, databases, accounts, and networks is of utmost importance. Due to the sensitive, private, or protected information they contain, databases are a common target for cyber attacks. To assess threats to data and lower the risk involved with data processing and storage, data security is crucial. Therefore, it is necessary to find solutions to the data security problems. It has become crucial to be up-to-date on different encryption technologies and trends due to the internet’s growing sophistication and dependence on internet data transmission. It can help protect confidential information and sensitive data and enhance the security of the system. In this paper, we propose a homomorphic encryption-based device authentication method while safeguarding template data. Homomorphic encryption technology has the capability of computing on encrypted data, making it more difficult for attackers to get their hands on the original template. In this study, the CKKS technique was used, which supports the approximation of real or complex numbers.
- C. Gentry, “Fully homomorphic encryption using ideal lattices,” in ACM Symp. Theory of Comput., 2009, pp. 169–178.
- C. Gentry, “Toward basing fully homomorphic encryption on worstcase hardness,” in Proc. CRYPTO, 2010, pp. 116–137.
- C. Gentry, “Computing arbitrary functions of encrypted data,” Commun. ACM, vol. 53, no. 3, pp. 97–105, 2010.
- Common Vulnerabilities in Password-Based Login | LoginRadius Blog. [online] Available at: https://www.loginradius.com/blog/identity/common-vulnerabilities-password-based-login/#:~:text=Passwords%20are%20one%20of%20the.
- Hamza, R., Hassan, A., Ali, A., Bashir, M.B., Alqhtani, S.M., Tawfeeg, T.M. and Yousif, A. (2022). Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms. Entropy, 24(4), p.519. doi:https://doi.org/10.3390/e24040519.
- Munjal, K. and Bhatia, R. (2022). A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex & Intelligent Systems. doi:https://doi.org/10.1007/s40747-022-00756-z.
- Yadav, S., Khanna, P.R. and Howells, G. (2022). Device Authentication Using Wavelet Based Features. International Journal for Information Security Research, [online] 12(1), pp.1062–1072.
- Mir Sajjad Hussain Talpur, Md Zakirul Alam Bhuiyan, and Guojun Wang. 2015. Shared–node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring. International Journal of Embedded Systems 7, 1 (2015), 43–54.
- Li, D. Song, S. Chen, X. Lu, “A Simple Fully Homomorphic Encryption Scheme Available in Cloud Computing”, In Proceeding of IEEE, (2012).
- Baohua Chen, Na Zhao, “Fully Homomorphic Encryption Application in Cloud Computing”, in Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 11th International Computer Conference, (2014).
- Yan Zhang, Li Zhou, Yuanfan Peng, Jing Zhang, “A secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing”, in proceedings of the 19th International Conference on Digital Signal Processing, (2014).
- Ovunc Kocabas, Tolga Soyata, “Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing”, in 8th International Conference on Cloud Computing, IEEE, (2015).
- Shu Qin Ren, Benjamin Hong Meng Tan, Sivaraman Sundaram, Taining Wang, Yibin Ng,Chang Victor, Khin Mi
- Nishikant, S., Burande, Prof. Kahate, S.A. (2015). Design Model for Two Server Password Authentication Protocol, IJCSET , 11,5, November.
- Suveetha, K., Manju, T. (2016). Ensuring Confidentiality of Cloud Data using Homomorphic Encryption, Indian Journal of Science and Technology , 9 (8), February.
- Im, J. H., Choi, J., Nyang, D., Lee, M. K. (2016). Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption, In : 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing , 878-881.
- Marta Gomez-Barrero., Emanuele Maiorana., Javier Galbally., Patrizio Campisi., Julian Fierrez., Multi-Biometric Template Protection Basedon Homomorphic Encryption, Pattern Recognition , 67, July, 149-163.
- Scheibner, J., Ienca, M. and Vayena, E. (2022). Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study. BMC Medical Ethics, 23(1). doi:10.1186/s12910-022-00852-2.
- A Vijaya Kumar, Mogalapalli Sai Sujith, Kosuri Tarun Sai, Galla Rajesh, and Devulapalli Jagannadha Sriram Yashwanth. 2020. Secure Multiparty computation enabled E-Healthcare system with Homomorphic encryption. In IOP Conference Series: Materials Science and Engineering, Vol. 981. IOP Publishing, 022079.
- Razvan Bocu and Cosmin Costache. 2018. A homomorphic encryption-based system for securely managing personal health metrics data. IBM Journal ofResearch and Development 62, 1 (2018), 1–1.
- Xiaoni Wang and Zhenjiang Zhang. 2015. Data division scheme based on homomorphic encryption in WSNs for health care. Journal of medical systems 39, 12 (2015), 1–7.
- Mostefa Kara, Abdelkader Laouid, Mohammed Amine Yagoub, Reinhardt Euler, Saci Medileh, Mohammad Hammoudeh, Amna Eleyan, and Ahcène Bounceur. 2021. A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case. Expert Systems (2021), e12767.
- Mir Sajjad Hussain Talpur, Md Zakirul Alam Bhuiyan, and Guojun Wang. 2015. Shared–node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring. International Journal of Embedded Systems 7, 1 (2015), 43–54.
- Haowen Tan, Pankoo Kim, and Ilyong Chung. 2020. Practical homomorphic authentication in cloud-assisted vanets with blockchain-based healthcare monitoring for pandemic control. Electronics 9, 10 (2020), 1683.
- Aitizaz Ali, Muhammad Fermi Pasha, Jehad Ali, Ong Huey Fang, Mehedi Masud, Anca Delia Jurcut, and Mohammed A Alzain. 2022. Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography. Sensors 22, 2 (2022),528.
- Albrecht M, Chase M, Chen H, et al. Homomorphic encryption standard[J]. Cryptology ePrint Archive, 2019.
- Lauter, M. Naehrig, and V. Vaikuntanathan, “Can homomorphic encryption be practical?,” in Proc. ACM Cloud Comput. Security Workshop, 2011.
- Ihsan Jabbar, Saad Najim, “Using fully Homomorphic encryption to secure cloud computing”, Internet of things and cloud computing, 2016, Volume 4, Issue 2, pp. 13-18, Science Publishing Group, ISSN: 2376-7731, DOI: 10.11648/j.iotcc.20160402.12.
- Yue, S. (2020). Fully Homomorphic Encryption Part One: A Gentle Intro. [online] Medium. Available at: https://stevenyue.medium.com/fully-homomorphic-encryption-part-one-a-gentle-intro-94c3c3850568 [Accessed 21 Oct. 2023].
- Microsoft Research. (n.d.). Microsoft SEAL: Fast and Easy-to-Use Homomorphic Encryption Library. [online] Available at: https://www.microsoft.com/en-us/research/project/microsoft-seal/.
- “Microsoft seal (release 3.2),” https://github.com/Microsoft/SEAL, February 2019, Microsoft Research, Redmond, WA.