{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:38:05Z","timestamp":1767109085915},"reference-count":25,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"<p>With the rapid development of cloud computing, which has become a key aspect to maintain the security of user information that may be highly confidential and maintained during transport and storage process. The reliance on traditional algorithms that are used to encrypt data are not secure enough because we cannot process the data only after decrypt. In this article is proposed the use of homomorphic encryption to solve this problem because it can deal with encrypted data without the decryption, which can lead to ensuring confidentiality of the data. A number of public-key algorithms are explained, which is based on the concept of homomorphic encryption. In this article an algorithm is proposed based on HE and it is similar to Menesez-EC but with one digit as a secret key according to its advantage, whereby reducing the cost of communication, and storage and provides high processing speed when compared with other algorithms. This algorithm provides enough security for a bank's customer information and then compared with ECC, each of RSA and Piallier algorithms as evaluated.<\/p>","DOI":"10.4018\/ijisp.2019040105","type":"journal-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T14:06:54Z","timestamp":1554386814000},"page":"67-85","source":"Crossref","is-referenced-by-count":3,"title":["Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions"],"prefix":"10.4018","volume":"13","author":[{"given":"Marwan Majeed","family":"Nayyef","sequence":"first","affiliation":[{"name":"Anbar University, Baghdad, Iraq"}]},{"given":"Ali Makki","family":"Sagheer","sequence":"additional","affiliation":[{"name":"University of Anbar, Baghdad, Iraq"}]}],"member":"2432","reference":[{"key":"IJISP.2019040105-0","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070241"},{"key":"IJISP.2019040105-1","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"IJISP.2019040105-2","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/ICIT.2015.39","article-title":"Homomorphic Encryption for Data Security in Cloud Computing.","author":"K. K.Chauhan","year":"2015","journal-title":"2015 International Conference on Information Technology (ICIT)"},{"key":"IJISP.2019040105-3","doi-asserted-by":"publisher","DOI":"10.1109\/IIKI.2014.35"},{"key":"IJISP.2019040105-4","first-page":"446","article-title":"Public key compression and modulus switching for fully homomorphic encryption over the integers.","author":"J. S.Coron","year":"2012","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"IJISP.2019040105-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.06.061"},{"issue":"15","key":"IJISP.2019040105-6","doi-asserted-by":"crossref","DOI":"10.17485\/ijst\/2015\/v8i15\/64749","article-title":"Modified ElGamal elliptic curve cryptosystem using hexadecimal representation.","volume":"8","author":"Z. E.Dawahdeh","year":"2015","journal-title":"Indian Journal of Science and Technology"},{"key":"IJISP.2019040105-7","article-title":"Public Key Compression Method for Fully Homomorphic Encryption using Genetic Algorithms","author":"G. F.Filho","year":"2016,","journal-title":"19th International Conference on Information Fusion"},{"key":"IJISP.2019040105-8","unstructured":"Gentry, C. (2009, September). A fully homomorphic encryption scheme. Stanford University: The ACM Digital Library."},{"key":"IJISP.2019040105-9","doi-asserted-by":"crossref","unstructured":"Gerasimov, A. N., Epishkina, A. V., & Kogos, K. G. (2017). Research of homomorphic encryption algorithms over integers. In IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 398-403).","DOI":"10.1109\/EIConRus.2017.7910576"},{"key":"IJISP.2019040105-10","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"IJISP.2019040105-11","first-page":"152","article-title":"Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing. In IEEE","author":"M.Hong","year":"2016,","journal-title":"International Conference on High Performance and Smart Computing (HPSC)"},{"key":"IJISP.2019040105-12","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.51"},{"key":"IJISP.2019040105-13","author":"Y.Hu","year":"2013","journal-title":"Improving the Efficiency of Homomorphic Encryption Schemes"},{"key":"IJISP.2019040105-14","author":"O.Kocaba","year":"2016","journal-title":"Design and Analysis of Privacy-Preserving Medical Cloud Computing Systems."},{"key":"IJISP.2019040105-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.10.020"},{"key":"IJISP.2019040105-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.310"},{"key":"IJISP.2019040105-17","unstructured":"Rivest, R.L., Adleman, L., & Michael L.D. (1987). On data banks and privacy homeomorphisms. Foundations of secure computation, 4(11), 169-180."},{"issue":"13","key":"IJISP.2019040105-18","article-title":"E-Voting using Homomorphic Encryption Scheme","volume":"141","author":"T.Sharma","year":"2016","journal-title":"International Journal of Computers and Applications"},{"key":"IJISP.2019040105-19","unstructured":"Stallings, W. (2011). Cryptography and network security principles and practice. Prentice Hall."},{"key":"IJISP.2019040105-20","author":"R.Sunuwar","year":"2015","journal-title":"Elgamal Encryption using Elliptic Curve Cryptography"},{"key":"IJISP.2019040105-21","doi-asserted-by":"crossref","unstructured":"Suveetha, K., & Manju, T. (2016). Ensuring Confidentiality of Cloud Data using Homomorphic Encryption. Indian Journal of Science and Technology, 9(8).","DOI":"10.17485\/ijst\/2016\/v9i8\/87964"},{"key":"IJISP.2019040105-22","first-page":"35","article-title":"Encrypted data processing with Homomorphic Re-Encryption","volume":"409","author":"D.Wenxiu","year":"2017","journal-title":"Information Sciences"},{"key":"IJISP.2019040105-23","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6919824"},{"key":"IJISP.2019040105-24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12229-8"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=226950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:24:47Z","timestamp":1651861487000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019040105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019040105","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}