Advanced Homomorphic Encryption for Cloud Data Security

D. Chandravathi - GVP College for Degree and PG courses, Viakhapatnam-45, India
P.V. Lakshmi - GITAM University, Viakhapatnam-45, India

Citation Format:



This paper aims to provide security of data in the Cloud using Multiplicative Homomorphic Approach. Encryption process is done with RSA algorithm. In this RSA algorithm, Shor’s algorithm is used for generating Public key Component, which enhances the security. Shor’s algorithm plays as important role in generating public key. Plain Text Message is encrypted with Public Key to generate Cipher Text and for decryption Chinese Remainder Theorem (CRT) is used to speed up the computations. By doing so, it shows how the CRT representation of numbers in Zn can be used to perform modular exponentiation about much more efficiently using three extra values pre-computed from the prime factors of n. Hence, security is enhanced in the cloud provider.


Multiplicative homomorphic; encryption; RSA algorithm; Shor’s algorithm; CRT; public key; modular exponentiation.

Full Text:



Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem G.N. Shinde and H.S. Fadewar , ICCES, vol.5, no.4, pp.255-261.

C. Lamprecht “Investigating the efficiency of Cryptographic algorithm in Online Transaction”ISN 1473-804X online, 1473-8031 I.J. of Simulation Vol.7, No.2.

AlexanderMay, “Cryptanalysis of Unbalanced RSA with Small CRT-Exponent”, CRYPTO 2002, LNCS 2442, pp 242-256, 2002.

JohannnesBlomer,Martin Otto, “a newCRT-RSA Algorithm Secure Against Bellcore”, CC’03, October 27-30,Washington, DC, USA.

Craig Gentry, A Fully Homomorphic Encryption Scheme,2009.

Understanding Homomorphic Encryption

Homomorphic Encryption Applied to the Cloud Computing Security Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI.

Vic (J.R.) Winkler, ”Securing the Cloud, Cloud Computer Security, Techniques and Tactics”, Elsevier.

R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.

A Fully Homomorphic Encryption Implementation on Cloud Computing Shashank Bajpai and Padmija Srivastava Cloud Computing Research Team, Center for Development of Advanced Computing [C-DAC], Hyderabad.


  • There are currently no refbacks.

JOIV : International Journal on Informatics Visualization
ISSN 2549-9610  (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W :
E :,,

View JOIV Stats

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.