TY - GEN
T1 - A Systematic Literature Review on the Security Weaknesses of Fully Homomorphic Encryption Schemes
AU - Vintimilla-Tapia, Emmanuel
AU - Rojas, Alexander
AU - Sigüenza, Marco
AU - Rodríguez Zúñiga, Andrea Paulina
AU - Cedillo, Priscila
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
PY - 2026
Y1 - 2026
N2 - Fully Homomorphic Encryption (FHE) represents a breakthrough in cryptography, allowing operations to be performed directly on encrypted data without decryption. This property holds immense potential for secure data processing in untrusted environments like cloud computing. This systematic review analyzes FHE schemes’ security weaknesses, identifies existing gaps, and evaluates their practical applications and limitations. The results reveal that significant challenges remain while FHE offers robust security services, such as data confidentiality and integrity. The main weaknesses are high computational costs, noise growth, and large sizes in ciphertexts, which limit the scalability of these implementations. Additionally, the lack of standardization in evaluation methodologies and limited validation in industrial environments hinders its adoption in real-world applications. Key areas for improvement were identified, including developing more efficient schemes and their practical validation. The findings provide a roadmap for researchers and professionals interested in optimizing FHE for future applications such as cloud computing, big data analytics, and electronic voting.
AB - Fully Homomorphic Encryption (FHE) represents a breakthrough in cryptography, allowing operations to be performed directly on encrypted data without decryption. This property holds immense potential for secure data processing in untrusted environments like cloud computing. This systematic review analyzes FHE schemes’ security weaknesses, identifies existing gaps, and evaluates their practical applications and limitations. The results reveal that significant challenges remain while FHE offers robust security services, such as data confidentiality and integrity. The main weaknesses are high computational costs, noise growth, and large sizes in ciphertexts, which limit the scalability of these implementations. Additionally, the lack of standardization in evaluation methodologies and limited validation in industrial environments hinders its adoption in real-world applications. Key areas for improvement were identified, including developing more efficient schemes and their practical validation. The findings provide a roadmap for researchers and professionals interested in optimizing FHE for future applications such as cloud computing, big data analytics, and electronic voting.
KW - Cloud Computing
KW - Fully Homomorphic Encryption (FHE)
KW - Security
KW - Systematic Review
UR - https://www.scopus.com/pages/publications/105020763629
U2 - 10.1007/978-3-032-08366-1_21
DO - 10.1007/978-3-032-08366-1_21
M3 - Contribución a la conferencia
AN - SCOPUS:105020763629
SN - 9783032083654
T3 - Communications in Computer and Information Science
SP - 312
EP - 328
BT - Information and Communication Technologies - 13th Ecuadorian Conference, TICEC 2025, Proceedings
A2 - Berrezueta, Santiago
A2 - Gualotuña, Tatiana
A2 - Fonseca C., Efrain R.
A2 - Rodriguez Morales, Germania
A2 - Maldonado-Mahauad, Jorge
PB - Springer Science and Business Media Deutschland GmbH
T2 - 13th Ecuadorian Conference on Information and Communication Technologies, TICEC 2025
Y2 - 16 October 2025 through 17 October 2025
ER -