What Is Homomorphic Encryption?

Homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without first decrypting it. Its significance is to truly solve the problem of confidentiality when entrusting data and its operations to a third party.


A homomorphism is a map between two algebraic structures (eg. Group, Ring, Vector space) of the same type, that preserves the operations of the structures. Mathematically speaking, this is an “operation preserving”.

Main Types of Homomorphic Encryption

The homomorphic encryption function refers to the encryption function of two plaintexts a and b that meet Dec(En(a)⊙En(b))=a⊕b, where En is the encryption operation, Dec is the decryption operation, ⊙, ⊕ Corresponding to operations on the plaintext and ciphertext domains respectively.

Currently, homomorphic encryption includes multiple types of encryption schemes according to the type and frequency of mathematical operations performed on its ciphertext.

  1. Partially Homomorphic Encryption (PHE) only allows selected mathematical functions to be performed on encrypted values to help data remain confidential. This means that an operation can be performed an unlimited number of times on the ciphertext. Partial homomorphic encryption (about multiply operations) is the basis of the RSA encryption algorithm , RSA encryption is usually used to establish a secure connection via SSL/TLS. In addition, common algorithms that use partially homomorphic encryption schemes include ElGamal cryptosystem and Paillier cryptosystem.

2. Somewhat homomorphic encryption(SHE) supports limited operations (for example, addition or multiplication) up to a certain degree of complexity, but these operations can only be performed a certain number of times.

3. Fully Homomorphic Encryption (FHE): It is the strongest notion of homomorphic encryption.

By helping to keep information secure and accessible, functionality can be aligned with privacy. This encryption scheme meets the properties of additive homomorphism and multiplication homomorphism at the same time, can use any effective computable function, and makes secure multi-party calculations more effective. Unlike other forms of homomorphic encryption, it can handle arbitrary calculations of ciphertext.


Take the cloud computing application scenario as an example. Alice uses the Cloud to process data with Homomorphic Encryption. The whole process is like:

  1. Alice encrypts the data. And send the encrypted data to Cloud;

2. The processing method of Alice submitting data to Cloud is represented by the function f here;

3. Cloud processes the data under function f and sends the processed result to Alice;

4. Alice decrypts the data and gets the result.


Homomorphic encryption technology has a wide range of applications in the calculation of ciphertext data in a distributed computing environment, such as cloud computing, multi-party secure computing, anonymous voting, ciphertext retrieval and anonymous access, etc.; homomorphic encryption technology also has corresponding applications in data privacy protection.


The current difficulty of homomorphic encryption technology lies in efficiency and it is not easy to find an algorithm that meets the homomorphic encryption required.




Makes Encryption Assets Safer

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Crypto Scam alert #01

How To Block / Blacklist a Number on ZTE Racer

How to Block Number AND SMS / Call on ZTE Racer

{UPDATE} Sim Racing Dash Hack Free Resources Generator

Special campaign for FLy Reddit

S-AES: Gets your hands dirty with actual computation

Signup/login security practices

Day 21, Web Reconnaissance Or Information Gathering — Part 6#100DaysofHacking

The Dark Web and Why Your Business Should Care

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Makes Encryption Assets Safer

More from Medium

Is Decentralised Data Processing a User-Centric Privacy Paradise?

Scale The Metaverse(s) — Hadean Supercomputing

Scalable Relayer Infrastructure for Blockchain Transactions.

JARVIS: bodyguard at your wrist