Khalil Hariss , Jean Paul A. Yaacoub , Hassan N. Noura
{"title":"Homomorphic cryptography: Challenges and perspectives","authors":"Khalil Hariss , Jean Paul A. Yaacoub , Hassan N. Noura","doi":"10.1016/j.cosrev.2025.100815","DOIUrl":null,"url":null,"abstract":"<div><div>The study proposes practical recommendations and future directions to improve HE’s relevance in the real world, especially in healthcare, digital forensics, Machine Learning (ML), and smart infrastructure. The primary product of this study is a cohesive framework that unifies mathematical foundations with real-world applications to direct the implementation and development of Homomorphic Cryptography (HC) in privacy-preserving computing. Homomorphic Encryption (HE), which is an innovative cryptographic technique, protects confidentiality, integrity, and authenticity in untrusted computing environments such as cloud infrastructure and Internet of Things (IoT) ecosystems by allowing computations on encrypted data without the need for decryption. The present study provides an in-depth investigation of HC, identifying symmetric and asymmetric methods and assigning them to the appropriate security services. The mathematical complexities of well-known HE algorithms like BGV, BFV, DGHV, and CKKS are further explained, and experimental performance evaluations are provided using the Python-SEAL and Microsoft SEAL libraries. The paper examines contemporary attacks and defences while highlighting significant drawbacks, such as computational cost and security flaws.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"59 ","pages":"Article 100815"},"PeriodicalIF":12.7000,"publicationDate":"2025-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000917","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The study proposes practical recommendations and future directions to improve HE’s relevance in the real world, especially in healthcare, digital forensics, Machine Learning (ML), and smart infrastructure. The primary product of this study is a cohesive framework that unifies mathematical foundations with real-world applications to direct the implementation and development of Homomorphic Cryptography (HC) in privacy-preserving computing. Homomorphic Encryption (HE), which is an innovative cryptographic technique, protects confidentiality, integrity, and authenticity in untrusted computing environments such as cloud infrastructure and Internet of Things (IoT) ecosystems by allowing computations on encrypted data without the need for decryption. The present study provides an in-depth investigation of HC, identifying symmetric and asymmetric methods and assigning them to the appropriate security services. The mathematical complexities of well-known HE algorithms like BGV, BFV, DGHV, and CKKS are further explained, and experimental performance evaluations are provided using the Python-SEAL and Microsoft SEAL libraries. The paper examines contemporary attacks and defences while highlighting significant drawbacks, such as computational cost and security flaws.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.