Homomorphic Encryption

Homomorphic encryption allows computations to be performed on data in use while that data is still encrypted. It is particularly useful for processing sensitive data in highly regulated industries such as healthcare when that data may present privacy concerns.

Homomorphic comes from the algebraic term homomorphism, where computation on an item or set preserves the nature of that data: it is not changed and will have the same result because it is processed algebraically. Homomorphic encryption was first initiated in the 1970s but is still in the early stages of implementation. There are multiple types of homomorphic encryption, but fully homomorphic encryption is the most comprehensive solution.

Examples of sensitive data in use that require better encryption include communications software and document collaboration, user accounts, and data being processed in cloud environments. Typically, data in use has to be decrypted for processing at least once, if not multiple times. This makes it much more susceptible to malicious interception. Skilled hackers might steal bank login information, for example, during the brief window in which it’s decrypted and processed. Homomorphic encryption removes that possibility by keeping the information encrypted throughout the entire process. It uses algebraic algorithms so that the data ends the same as if it had been processed while decrypted. Lattice-based cryptography is one of the better known methods of homomorphic encryption; it uses lattices (complex mathematical equations) to encrypt information.

Despite its usefulness in protecting data, homomorphic encryption is not yet widely used. Because the algebraic processes take a significant amount of computing energy, homomorphic encryption is too slow for most large businesses to regularly implement. Though it’s a promising method for data security, it is still relatively new and will require more research and development before companies can use it efficiently.






Jenna Phipps
Jenna Phipps is a contributor for websites such as Webopedia.com and Enterprise Storage Forum. She writes about information technology security, networking, and data storage. Jenna lives in Nashville, TN.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand today's texting lingo. Includes Top...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

SAP Software

SAP is an end-to-end enterprise solution provider specializing in enterprise resource...

Chief Operating Officer (COO)

The chief operating officer (COO) is a member of a company's senior executive...

Kanban

Kanban is a workflow management method intended to define, manage, and improve services...