|
Cryptography techniques | References | Supported operations | Usability | Privacy |
|
Identity-based encryption | [145, 146] | Use for data access control | Required a valid password to access data | Provides a high level of privacy |
Symmetric-key encryption | [143] | Encryption and Decryption of data using the same key | No functionality can be performed on encrypted data | Provides a high level of privacy |
Public-key encryption | [144] | Use for data access control | Required a valid public key for encryption and private key for decryption | No key exchange is required. Provides a very high level of privacy |
Attribute-based encryption | [147, 148] | Data access control based on attributes | Less secure than public-key encryption | Provides lesser privacy than public-key encryption |
Functional encryption | [149, 150] | Used for selected plaintext | Required a valid function | Privacy depends on the function |
Fully HE | [139] | Allows all the arithmetic operations | Practically not useable | Provides a very high level of privacy |
Somewhat HE | [137, 138] | Allows more addition and one multiplication | Useable for limited arithmetic operations | Provides a medium level of privacy |
Partially HE | [134–136] | Allows only one arithmetic operation | Useable for limited arithmetic operations | Provides a low level of privacy |
Searchable encryption | [140–142] | Allows query search on encrypted data | Useable on encrypted data | Provides a high level of privacy |
Signcryption | [151–155] | Used for user authentication | Useable when efficient authentication is required | Provides a high level of privacy |
|