Secured E-Banking using Multi-Identity based Fully Homomorphic Encryption
PDF
PDF

How to Cite

K., Sundaramoorthy, Lokanya G., and Ashlin Prajaa P. J. 2025. “Secured E-Banking Using Multi-Identity Based Fully Homomorphic Encryption”. Journal of Electronics and Informatics 7 (2): 122-32. https://doi.org/10.36548/jei.2025.2.004.

Keywords

— Fully Homomorphic Encryption
— Cyber Security
— Data privacy
— Access Control
— Multi-identity
— Encrypted processing
— Digital Banking
Published: 27-05-2025

Abstract

In today's digital landscape, ensuring the security of e-banking platforms is crucial for preventing unauthorized access and safeguarding sensitive financial information. This project employs Fully Homomorphic Encryption (FHE), a significant advancement in cryptography that enables the processing of encrypted data without the need for decryption, thereby preserving privacy throughout the transaction. A pivotal aspect of the system is its encrypted authentication mechanism, which protects login credentials, including usernames and passwords. Additionally, the platform introduces a multi-identity authentication model, allowing users to engage with the system under various secure roles. By integrating FHE with a multi-identity framework, the system provides robust protection against cyber threats.

References

  1. G. Tu, W. Liu, T. Zhou, X. Yang and F. Zhang, "Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme," in IEEE Access, vol. 12, (2024): 49640-49652.
  2. Pulido-Gaytan, Bernardo, Andrei Tchernykh, Franck Leprévost, Pascal Bouvry, and Alfredo Goldman. "Toward understanding efficient privacy-preserving homomorphic comparison." IEEE Access 11 (2023): 102189-102206.
  3. Lee, Seunghwan, and Dong-Joon Shin. "Overflow-detectable floating-point fully homomorphic encryption." IEEE Access 12 (2024): 6160-6180.
  4. Behera, Sagarika, and Jhansi Rani Prathuri. "Design of novel hardware architecture for fully homomorphic encryption algorithms in fpga for real-time data in cloud computing." IEEE Access 10 (2022): 131406-131418.
  5. Shen, Tongchen, Fuqun Wang, Kefei Chen, Kunpeng Wang, and Bao Li. "Efficient leveled (multi) identity-based fully homomorphic encryption schemes." IEEE Access 7 (2019): 79299-79310.
  6. Kogos, Konstantin G., Kseniia S. Filippova, and Anna V. Epishkina. "Fully homomorphic encryption schemes: The state of the art." In 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. IEEE, (2017): 463-466.
  7. Moore, Ciara, Máire O'Neill, Elizabeth O'Sullivan, Yarkın Doröz, and Berk Sunar. "Practical homomorphic encryption: A survey." In 2014 IEEE International Symposium on Circuits and Systems (ISCAS), pp. IEEE, (2014): 2792-2795.
  8. Parmar, Payal V., Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, and Rutvij H. Jhaveri. "Survey of various homomorphic encryption algorithms and schemes." International Journal of Computer Applications 91, no. 8 (2014).
  9. Yi, Xun, Russell Paulet, Elisa Bertino, Xun Yi, Russell Paulet, and Elisa Bertino. Homomorphic encryption. Springer International Publishing, 2014.
  10. Kim, Andrey, Yuriy Polyakov, and Vincent Zucca. "Revisiting homomorphic encryption schemes for finite fields." In Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part III 27, pp. Springer International Publishing, (2021): 608-639.
  11. Jain, Nitin, Saibal K. Pal, and Dhananjay K. Upadhyay. "Implementation and analysis of homomorphic encryption schemes." Intern. J. on Cryptography and Information Security (IJCIS) 2, no. 2 (2012): 27-44.