Homomorphic Encryption

Homomorphic encryption allows computations to be performed on data in use while that data is still encrypted. It is particularly useful for processing sensitive data in highly regulated industries such as healthcare when that data may present privacy concerns.

Homomorphic comes from the algebraic term homomorphism, where computation on an item or set preserves the nature of that data: it is not changed and will have the same result because it is processed algebraically. Homomorphic encryption was first initiated in the 1970s but is still in the early stages of implementation. There are multiple types of homomorphic encryption, but fully homomorphic encryption is the most comprehensive solution.

Examples of sensitive data in use that require better encryption include communications software and document collaboration, user accounts, and data being processed in cloud environments. Typically, data in use has to be decrypted for processing at least once, if not multiple times. This makes it much more susceptible to malicious interception. Skilled hackers might steal bank login information, for example, during the brief window in which it’s decrypted and processed. Homomorphic encryption removes that possibility by keeping the information encrypted throughout the entire process. It uses algebraic algorithms so that the data ends the same as if it had been processed while decrypted. Lattice-based cryptography is one of the better known methods of homomorphic encryption; it uses lattices (complex mathematical equations) to encrypt information.

Despite its usefulness in protecting data, homomorphic encryption is not yet widely used. Because the algebraic processes take a significant amount of computing energy, homomorphic encryption is too slow for most large businesses to regularly implement. Though it’s a promising method for data security, it is still relatively new and will require more research and development before companies can use it efficiently.

Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...


An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...


ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...


Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...