Partially Homomorphic Encryption Schemes

There are several useful PHE examples [Rivestet al. 1978b; Goldwasser and Micali 1982 ElGamal1985; Benaloh 1994; Naccache and Stern 1998; Okamoto and Uchiyama 1998; Paillier 1999; Damgård and Jurik 2001; Kawachi et al. 2007] in the literature. Each has improved the PHE in some way. However, in this section, we primarily focus on major PHE schemes that are the basis for many other PHE schemes.

Leave a comment