Lack of Unified APIs and Benchmarks: FHE
lacks standardized application programming
interfaces (APIs) and concrete benchmarks, further
complicating its integration with existing systems
(Gorantala et al. 2023). The lack of standardization
makes it difficult for developers to evaluate the
performance and security of their FHE
implementations and to ensure compatibility across
different systems and applications.
Standardization Efforts: Recognizing these
challenges, researchers are continually working to
develop FHE standards. The International
Organization for Standardization (ISO) and the
International Electrotechnical Commission (IEC)
have launched the FHE standards project, which is
currently in the consultation phase. Future phases of
standardization may involve the development of
standards for application areas including memory
encryption, wireless communications and portable
devices (Iapp 2013). Key management is an
important aspect of FHE and the focus of these
standardization efforts, as the current public key
infrastructure is not well suited for FHE.
3.3 The Development of FHE in the
Future
Regarding future developments, there are ongoing
efforts to standardize and benchmark FHE. The
International Organization for Standardization (ISO)
and the International Electrotechnical Commission
(IEC) have launched the FHE standards project,
which is currently in the consultation phase. This
standardization may extend to applications such as
memory encryption, wireless communications, and
multi-stakeholder software-defined networking (Iapp
2013). Key management is another area of focus,
especially given that the current public key
infrastructure is not well suited for FHE. In the future
they should accelerate FHE performance,
standardization and benchmarking, develop user-
friendly tools and libraries, collaborative research and
development.
4 CONCLUSION
This paper mainly describes the background
knowledge of FHE and some FHE methods. This is a
cutting-edge encryption technology that can calculate
encrypted data without decryption. Great strides have
been made in this area, with various schemes such as
CKKS, CONCRETE, TFHE and FHEW playing a
key role. Despite these advances, FHE still faces
challenges such as computational inefficiency,
implementation complexity, and lack of standardized
APIs and benchmarks. This paper studies in detail the
CKKS scheme, which is known for its efficiency in
handling real or complex numbers and its suitability
for applications such as machine learning. However,
an overarching theme in FHE development is
balancing its groundbreaking potential for secure data
processing with the ongoing challenge of optimizing
its performance and usability for wider practical
applications. It is anticipated that these challenges
and shortcomings can be overcome one by one in the
future. This article may lack some actual data, which
will be filled in in the future.
REFERENCES
Wikipedia Contributors, Homomorphic Encryption.,
Wikimedia Foundation, 3 (2019).
M. Van Dijk, C. Gentry, S. Halevi, & V. Vaikuntanathan,
Fully Homomorphic Encryption over the Integers 2010.
F. Armknecht, C. Boyd, C. Carr, K. Gjøsteen, A. Jäschke,
C. A. Reuter & M. Strand, A Guide to Fully
Homomorphic Encryption, EPrint IACR (2015).
M. Joye, Guide to Fully Homomorphic Encryption over the
[Discretized] Torus, EPrint IACR (2021) .
R. Uppal, (n.d.). DARPA DPRIVE developing an ASIC for
Fully homomorphic encryption (FHE) to ensure Data
privacy and Security, International Defense Security &
Technology, January 5 (2024).
Darpa.mil, PROgramming Computation on EncryptEd
Data (2024).
Intel, Intel to Collaborate with Microsoft on DARPA
Program, Intel, January 5 (2024).
Anon, XOR Secret Computing Engine, Inpher, January 5
(2024).
A. Marget, Data Encryption: How It Works & Methods
Used, Unitrends, January 27 (2022).
F. Armknecht, C. Boyd, C. Carr, K. Gj.steen, A. J.schke, C.
A. Reuter, M. Strand, A guide to fully homomorphic
encryption, IACR Cryptol. ePrint Arch., 2015:1192.
G. Michael, Fully homomorphic encryption with
applications to privacy-preserving machine learning,
Jan (1970).
H. Yousuf, M. Lahzi, S. A. Salloum, K. Shaalan,
Systematic review on fully homomorphic encryption
scheme and its application, Recent Advances in
Intelligent Systems and Smart Applications (2020).
H. Khalil et al. On DGHV and BGV fully homomorphic
encryption schemes. 2017 1St cyber security in
networking conference (CSNet) (2017).
M. Christian, et al. Multiparty homomorphic encryption
from ring-learning-with-errors. Proceedings on Privacy
Enhancing Technologies 2021.CONF (2021).
Translating Algorithms to Handle Fully Homomorphic
Encrypted Data on the Cloud - Scientific Figure on
ResearchGate, 30 Dec (2023).