{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T01:38:15Z","timestamp":1770341895934,"version":"3.49.0"},"reference-count":73,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T00:00:00Z","timestamp":1612396800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2021,3,29]]},"abstract":"<jats:p> As there is a continuous delivery of big data, the researchers are showing interest in the applications of cloud computing concerning privacy, and security. On the other hand, many researchers and experts of cybersecurity have commenced on a quest for improving the data encryption to the models of big data and applications of cloud computing. Since many users of the cloud become public cloud services, confidentiality turns out to be a more compound problem. To solve the confidentiality problem, cloud clients maintain the data on the public cloud. Under this circumstance, Homomorphic Encryption (HE) appears as a probable solution, in which the information of the client is encrypted on the cloud in such a process that it permits few manipulation operations without decryption. The main intent of this paper is to present the systematic review of research papers published in the field of Fully Homomorphic Encryption (FHE) over the past 10 years. The encryption scheme is considered full when it consists of plaintext, a ciphertext, a keyspace, an encryption algorithm, and a decryption algorithm. Hence, the review mostly concentrates on reviewing more powerful and recent FHE. The contributions using different algorithms in FHE like Lattice-based, integer-based, Learning With Errors (LWE), Ring Learning With Errors (RLWE), and Nth degree Truncated polynomial Ring Units (NTRU) are also discussed. Finally, it highlights the challenges and gaps to be addressed in modeling and learning about competent, effectual, and vigorous FHE for the cloud sector and pays attention to directions for better future research. <\/jats:p>","DOI":"10.3233\/jcs-200071","type":"journal-article","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T18:40:22Z","timestamp":1612809622000},"page":"135-160","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Research perspectives on fully homomorphic encryption models for cloud sector"],"prefix":"10.1177","volume":"29","author":[{"given":"Sonam","family":"Mittal","sequence":"first","affiliation":[{"name":"Chitkara University Institute of Engineering & Technology, Chitkara University, Punjab, India. E-mails:\u00a0,\u00a0"}]},{"given":"K.R.","family":"Ramkumar","sequence":"additional","affiliation":[{"name":"Chitkara University Institute of Engineering & Technology, Chitkara University, Punjab, India. E-mails:\u00a0,\u00a0"}]}],"member":"179","published-online":{"date-parts":[[2021,2,4]]},"reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2553647"},{"key":"ref002","doi-asserted-by":"crossref","unstructured":"A.A.\u00a0Agarkar and H.\u00a0Agrawal, LRSPPP: Lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid, Heliyon 5(3) (2019).","DOI":"10.1016\/j.heliyon.2019.e01321"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.10.008"},{"key":"ref004","doi-asserted-by":"crossref","unstructured":"A.\u00a0Amuthan and R.\u00a0Sendhil, Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing, Journal of Ambient Intelligence and Humanized Computing (2020).","DOI":"10.1007\/s12652-020-01849-8"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2018.11.014"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2498606"},{"key":"ref008","doi-asserted-by":"crossref","unstructured":"R.\u00a0Challa, G.\u00a0VijayaKumari and B.\u00a0Sunny, Secure image processing using LWE based homomorphic encryption, in: 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, 2015, pp.\u00a01\u20136.","DOI":"10.1109\/ICECCT.2015.7226064"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010076"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2350431"},{"key":"ref011","doi-asserted-by":"crossref","unstructured":"H.\u00a0Chen, R.\u00a0Gilad-Bachrach, K.\u00a0Han, Z.\u00a0Huang, A.\u00a0Jalali, K.\u00a0Laine and K.\u00a0Lauter, Logistic regression over encrypted data from fully homomorphic encryption, BMC Medical Genomics (2018), 11.","DOI":"10.1186\/s12920-018-0397-z"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2015.07.038"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749419"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925425"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.021"},{"key":"ref016","doi-asserted-by":"crossref","unstructured":"J.H.Cheon and D.Stehl\u00e9, Fully homomophic encryption over the integers revisited, in: Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2015, pp.\u00a0513\u2013536.","DOI":"10.1007\/978-3-662-46800-5_20"},{"key":"ref017","doi-asserted-by":"crossref","unstructured":"I.\u00a0Chillotti, N.\u00a0Gama, M.\u00a0Georgieva and M.\u00a0Izabach\u00e8ne, Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds, in: International Conference on the Theory and Application of Cryptology and Information Security, 2016, pp.\u00a03\u201333.","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_28"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.06.061"},{"key":"ref020","doi-asserted-by":"crossref","unstructured":"M.\u00a0Dijk, C.\u00a0Gentry, S.\u00a0Halevi and V.\u00a0Vaikuntanathan, Fully homomorphic encryption over the integers, in: Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2010, pp.\u00a024\u201343.","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-016-1142-0"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2014.06.003"},{"key":"ref023","doi-asserted-by":"crossref","unstructured":"L.\u00a0Ducas and D.\u00a0Micciancio, FHEW: Bootstrapping homomorphic encryption in less than a second, in: Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2015, pp.\u00a0617\u2013640.","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2780885"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2870984"},{"key":"ref026","unstructured":"C.\u00a0Gentry, A fully homomorphic encryption scheme, Stanford University, 2009."},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.02.001"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08511-2"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1016\/j.jart.2015.06.004"},{"key":"ref031","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2015.2458033"},{"key":"ref032","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2296-6"},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6083-9"},{"key":"ref034","doi-asserted-by":"crossref","unstructured":"F.\u00a0Jin, Y.\u00a0Zhu and X.\u00a0Luo, Verifiable fully homomorphic encryption scheme, in: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang, 2012, pp.\u00a0743\u2013746.","DOI":"10.1109\/CECNet.2012.6202046"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2723-9"},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2012.03.003"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.392"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2015.1101882"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971342"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-019-1388-4"},{"key":"ref041","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0626-5"},{"key":"ref042","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-015-1034-9"},{"key":"ref043","unstructured":"B.\u00a0Liu, Efficient architecture and implementation for NTRU based system, 2015, Theses-Dissertations-Major-Papers."},{"key":"ref044","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S1"},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.121"},{"key":"ref046","unstructured":"P.\u00a0Mahajan and A.\u00a0Sachdeva, A study of encryption algorithms AES, DES and RSA for security, Global Journal of Computer Science and Technology Network, Web & Security 1(15) (2013)."},{"key":"ref047","doi-asserted-by":"publisher","DOI":"10.1109\/AiCIS.2018.00043"},{"key":"ref048","doi-asserted-by":"crossref","unstructured":"N.\u00a0Mainardi, A.\u00a0Barenghi and G.\u00a0Pelosi, Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes, Computers & Security 87 (2019).","DOI":"10.1016\/j.cose.2019.101587"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2019.0004"},{"key":"ref050","doi-asserted-by":"publisher","DOI":"10.5120\/17487-7999"},{"key":"ref051","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2371237"},{"key":"ref052","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Min, G.\u00a0Yang, A.K.\u00a0Sangaiah, S.\u00a0Bai and G.\u00a0Liu, A privacy protection-oriented parallel fully homomorphic encryption algorithm in cyber physical systems, EURASIP Journal on Wireless Communications and Networking (2019).","DOI":"10.1186\/s13638-018-1317-9"},{"key":"ref053","doi-asserted-by":"crossref","unstructured":"C.\u00a0Moore, M.\u00a0O\u2019Neill, N.\u00a0Hanley and E.\u00a0O\u2019Sullivan, Accelerating integer-based fully homomorphic encryption using Comba multiplication, in: 2014 IEEE Workshop on Signal Processing Systems (SiPS), Belfast, 2014, pp.\u00a01\u20136.","DOI":"10.1109\/SiPS.2014.6986063"},{"key":"ref054","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5191"},{"key":"ref055","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1095-y"},{"key":"ref056","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.05.022"},{"key":"ref057","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1399-x"},{"key":"ref058","doi-asserted-by":"crossref","unstructured":"L.C.\u00a0Santos, G.R.\u00a0Bilar and F.D.\u00a0Pereira, Implementation of the fully homomorphic encryption scheme over integers with shorter keys, in: 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), Paris, 2015, pp.\u00a01\u20135.","DOI":"10.1109\/NTMS.2015.7266495"},{"key":"ref059","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2725953"},{"key":"ref060","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922685"},{"key":"ref061","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2184092"},{"key":"ref062","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2014.928286"},{"key":"ref063","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909286"},{"key":"ref064","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2018.2789468"},{"key":"ref065","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1685"},{"key":"ref066","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1056-7"},{"key":"ref067","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4729-x"},{"key":"ref068","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5226-1"},{"key":"ref069","doi-asserted-by":"crossref","unstructured":"X.\u00a0Wang, T.\u00a0Luo and J.\u00a0Li, A more efficient fully homomorphic encryption scheme based on GSW and DM schemes, Security and Communication Networks (2018), 14.","DOI":"10.1155\/2018\/8706940"},{"key":"ref070","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.014"},{"key":"ref071","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6919824"},{"key":"ref072","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2017.1293199"},{"key":"ref073","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.10.024"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-200071","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-200071","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-200071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T05:16:16Z","timestamp":1741670176000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-200071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,4]]},"references-count":73,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3,29]]}},"alternative-id":["10.3233\/JCS-200071"],"URL":"https:\/\/doi.org\/10.3233\/jcs-200071","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,4]]}}}