Cryptology is defined as the science of making communication incomprehensible to third parties who have no right to read and understand the data or messages. Cryptology consists of two parts, namely, cryptography and cryptanalysis. Cryptography analyzes methods of encrypting messages, and cryptanalysis analyzes methods of decrypting encrypted messages. Encryption is the process of translating plaintext data into something that appears to be random and meaningless. Decryption is the process of converting this random text into plaintext. Cloud computing is the legal transfer of computing services over the Internet. Cloud services let individuals and businesses to use software and hardware resources at remote locations. Widespread use of cloud computing raises the question of whether it is possible to delegate the processing of data without giving access to it. However, homomorphic encryption allows performing computations on encrypted data without decryption. In homomorphic encryption, only the encrypted version of the data is given to the untrusted computer to process. The computer will perform the computation on this encrypted data, without knowing anything on its real value. Finally, it will send back the result, and whoever has the proper deciphering key can decrypt the cryptogram correctly. The decrypted result will be equal to the intended computed value. In this paper, homomorphic encryption and their types are reviewed. Also, a simulation of somewhat homomorphic encryption is examined.

#### Keywords

- homomorphic encryption
- cryptology
- cloud computing

#### MSC 2010

- 94A60

Cryptology is defined as the science of making communication incomprehensible to third parties who have no right to read and understand the data or messages. Cryptology is divided into cryptography, which is the science of securing data, and cryptanalysis, which is the science of analyzing and breaking secure communication. The main terms in cryptology are given in Table 1.

Main terms in cryptology

Plaintext | Data that are wanted to be protected. Let us call it P |

Ciphertext | Encrypted message |

Encryption | Method of hiding message. If E refers to encryption function Ek (P) = C |

Decryption | Recovering encrypted message. If D refers to decryption function Dk (C) = P |

Key | A numeric value to cipher data to protect it |

Cryptography is the practice and study of hiding information. A cryptographic algorithm works in combination with a key—a word, number, or phrase—to encrypt the plaintext. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key. There are two types of cryptography: symmetric and asymmetric. If the same key is used for encryption and decryption, then the mechanism is called symmetric key cryptography or classical cryptography. This also implies to share a different key with everyone that is wanted to communicate with. Nevertheless, symmetric schemes present the advantage of being fast and should be used as often as possible.

However, if two different keys are used for encryption and decryption, then the mechanism is called asymmetric key cryptography or modern cryptography. The encryption key is public, as the decryption key remains private in this type. Asymmetric schemes are more functional than symmetric ones since there is no need for the sender and the receiver to agree on anything before the transaction. Asymmetric schemes, however, have a big drawback. They are often based on nontrivial mathematical computations and much slower than the symmetric ones. The two most prominent examples are RSA and ElGamal.

The right scheme is the one that fits your constraints in the best way. By constraints, we may understand constraints in terms of time, memory, security, and so forth.

It is the reverse process of cryptography. The objective of cryptanalyst is to decrypt the ciphertext.

The goal of encryption is to ensure confidentiality of data in communication and storage processes. Homomorphic encryption is a form of encryption that allows specific types of computations like addition or multiplication to be carried out on ciphertext. The encrypted result will be the same when decryption is done. Widespread use of cloud computing raises the question of whether it is possible to delegate the processing of data without giving access to it. Encrypting one’s data with a conventional encryption scheme to protect one’s privacy seems to undermine the benefits of cloud computing since it is impossible to process the data without the decryption key [1]. However, in homomorphic encryption; only the encrypted version of the data is given to the untrusted computer to process. The computer will perform the computation on this encrypted data, without knowing anything on its real value. Finally, it will send back the result, and whoever has the proper deciphering key can decrypt the cryptogram correctly. For coherence, the decrypted result will be equal to the intended computed value.

Homomorphic encryption schemes are methods that allow the transformation of ciphertexts C(M) of message M, to ciphertexts C(f(M)) of a computation/function of message M, without disclosing the message. Generally, an encryption scheme contains a three-step algorithm. They are

Key Generation—creates two keys, i.e. the secret key sk and the public key pk.

Encryption—encrypts the plaintext m with the public key pk to yield ciphertext c.

Decryption—decrypts the ciphertext c with the secret key sk to retrieve the plaintext m [2].

The most popular PHE methods available are the RSA, ElGamal, and Paillier methods.

The most popular SWHE method is Boneh-Goh-Nissim (BGN) method. This method allows any number of additions but only one multiplication to be performed on data.

The most popular FHE schemes are algebra homomorphic encryption scheme based on updated ElGamal proposed by Chen Liang and Gao Changmin in 2008 and enhanced homomorphic encryption scheme (EHES) proposed by Gorti VNKV and Subba Rao in 2013. In 2009, Gentry proposed the first not yet broken FHE scheme [3]. FHE refers to cryptosystems that can process both additions and multiplications in the encrypted domain. Any polynomial function over encrypted data can be computed.

In homomorphic encryption, the encryption of the product of two numbers is equal to the product of the encryptions of the numbers:

In this paper, SWHE is examined. The length of the plaintext and encryption time comparison has been made. To do that, Gentry’s encryption scheme is used [7]
. The parameters will be

Set public key

In the experimental environment, safe parameter ^{5}. So the order of magnitude for ^{5}. ^{5}, the order of magnitude for ^{2}) as 10^{10}, the order of magnitude for ^{4}) as 10^{20}, and the order of magnitude for ^{5}) as 10^{25}. Algorithm keygen of the data is determined by the above parameters. The relationship between the plaintext and ciphertext size is shown in Figure 1. The simulation time is calculated in seconds. It is observed that when plaintext size is increased, the ciphertext size is also increased. But the growthe rate is not high. Still, it is gradually increased.

Cryptography is a powerful tool to protect information. In recent years, cryptography and cryptanalysis had been improved. Widespread use of cloud computing raises the question of whether it is possible to delegate the processing of data without giving access to it. Homomorphic encryption is a new way to protect private data. Because it allows making computation without decrypting data. It is a new field and research is going on.

#### Main terms in cryptology

Plaintext | Data that are wanted to be protected. Let us call it P |

Ciphertext | Encrypted message |

Encryption | Method of hiding message. If E refers to encryption function Ek (P) = C |

Decryption | Recovering encrypted message. If D refers to decryption function Dk (C) = P |

Key | A numeric value to cipher data to protect it |

Design and application of vibration performance testing system for commercial vehicles An algorithm of moving pieces to become black alternation with white based on dimension reduction Applications of the extended rational sine-cosine and sinh-cosh techniques to some nonlinear complex models arising in mathematical physics Study on the Classification of Forestry Infrastructure from the Perspective of Supply Based on the Classical Quartering Method A Modified Iterative Method for Solving Nonlinear Functional Equation Optical soliton solutions to a (2+1) dimensional Schrödinger equation using a couple of integration architectures Case analysis of energy consumption of the existing office building in the severe cold region Has the belt and road initiative boosted the resident consumption in cities along the domestic route? – evidence from credit card consumption Analysis of the agglomeration of Chinese manufacturing industries and its effect on economic growth in different regions after entering the new normal Some new inequalities for convex functions via Riemann-Liouville fractional integrals Attitude control for the rigid spacecraft with the improved extended state observer EGA for a Convective Regime Over a Vertical Cylinder Stretching Linearly The research of power allocation algorithm with lower computational complexity for non-orthogonal multiple access Research on the normalisation method of logging curves: taking XJ Oilfield as an example Study on water damage mechanism of asphalt pavement based on industrial CT technology Technology sharing game from ecological perspective A finite element analysis of the impact of split pole shoes on magnetic liquid sealing performance Research on space optimization of historic blocks on Jiangnan from the perspective of place construction Predicting stock high price using forecast error with recurrent neural network Travelling wave solutions to the proximate equations for LWSW A prediction model of urban counterterrorism based on stochastic strategy The Comprehensive Diagnostic Method Combining Rough Sets and Evidence Theory Design of software-defined network experimental teaching scheme based on virtualised Environment Some Properties of Diagonal Lifts in Semi-Cotangent Bundles System dynamics model of output of ball mill Energy-saving design of office buildings considering light environment and thermal environment On Pull-Back Bundle of Tensor Bundles Defined by Projection of The Cotangent Bundle Interval Sheffer Stroke Basic Algebras and Yang-Baxter Equation About one method of calculation in the arbitrary curvilinear basis of the Laplace operator and curl from the vector function Cartesian space robot manipulator clamping movement in ROS simulation and experiment Research of urban waterfront space planning and design based on children-friendly idea Data processing method of noise logging based on cubic spline interpolation Sensitivity Analysis of the Waterproof Performance of Elastic Rubber Gasket in Shield Tunnel Some Structures on Neutrosophic Topological Spaces Temporal association rules discovery algorithm based on improved index tree Investigating the impacts of artificial intelligence technology on technological innovation from a patent perspective Dichromatic polynomial for graph of a (2,n)-torus knot Limiting Case of the Spin Hypersurface Dirac Operator arising in the positive mass theorem for black holes Exact solutions of (2 + 1)-Ablowitz-Kaup-Newell-Segur equation A novel family of 1-D robust chaotic maps Nonlinear optimization generating the Tomb Mural Blocks by GANS On Some Integral Inequalities via Conformable Fractional Integrals Evaluation Method of Traffic Safety Maintenance of High-Grade Highway Regarding new wave distributions of the non-linear integro-partial Ito differential and fifth-order integrable equations Wheelchair Size and Material Application in Human-machine System Model Nonlinear Mathematical Modelling of Bone Damage and Remodelling Behaviour in Human Femur Value Creation of Real Estate Company Spin-off Property Service Company Listing Research progress in the mining technology of the slowly inclined, thin to medium thick phosphate rock transition from open-pit to underground mine Entrepreneur's Passion and Entrepreneurial Opportunity Identification: A Moderated Mediation Effect Model Some Characterizations of Neutrosophic Submodules of an R -moduleNew Travelling Wave Solution-Based New Riccati Equation for Solving KdV and Modified KdV Equations Analysis on the influence factors of college students about the willingness to work in rural e-commerce Research on style control in planning and designing small towns New Principles of Non-Linear Integral Inequalities on Time Scales Periodic orbits in the restricted problem of three bodies in a three-dimensional coordinate system when the smaller primary is a triaxial rigid body The sloshing law of liquid surface for ground rested circular RC tank under unidirectional horizontal seismic action Computing Forgotten Topological Index of Extremal Cactus Chains Walking model and planning algorithm of the over-obstacle pipe climbing robot Study on the social impact Assessment of Primary Land Development: Empirical Analysis of Public Opinion Survey on New Town Development in Pinggu District of Beijing Research on the countermeasures of cultivating the competence of born after 2000 college student cadres Possible Relations between Brightest Central Galaxies and Their Host Galaxies Clusters and Groups An empirical investigation of physical literacy-based adolescent health promotion MHD 3-dimensional nanofluid flow induced by a power-law stretching sheet with thermal radiation, heat and mass fluxes The Incomplete Global GMERR Algorithm for Solving Sylvester Equation Periodic solutions for differential systems in ℝ ^{3}and ℝ^{4}A Method of Directly Defining the inverse Mapping for a HIV infection of CD4+ T-cells model On the interaction of species capable of explosive growth NTRU Over Galois Rings Two equal collinear cracks in magneto-electro-elastic materials: A study of electric and magnetic poling influences On the analytical approximation of the quadratic non-linear oscillator by modified extended iteration method Combustion stability control of gasoline compression ignition (GCI) under low-load conditions: A review Decision-making system and verification of pavement diseases treatment scheme for highway reconstruction and extension Evaluation and optimization of insulation status test for primary heating network Optimal allocation of microgrid using a differential multi-agent multi-objective evolution algorithm Effects of internal/external EGR and combustion phase on gasoline compression ignition at low-load condition Attribute Reduction Method Based on Sample Extraction and Priority Research on key influence factors of creativity development of applied undergraduates based on PCA Impact of Web Page House Listing Cues on Internet Rental Research on Motion Control for a Mobile Robot Using Learning Control Method Research on management and control strategy of E-bikes based on attribute reduction method A study of aerial courtyard of super high-rise building based on optimisation of space structure