Optimized Hybrid Homomorphic Signed-Integers Encryption: Addressing Challenges and Enhancing Capabilities
DOI:
https://doi.org/10.21928/uhdjst.v10n1y2026.pp116-129Keywords:
Homomorphic Encryption, Signed Integer Encryption, Subtractive homomorphic Property, Carmichael Function, National Institute of Standards and Technology Statistical Test SuiteAbstract
Homomorphic cryptography produces encrypted data that supports computation, but current exponential techniques face critical limitations: they leak plaintext information for negative values and fail on trivial values (0, ±1). Additional challenges include private key disclosure, encryption failure under specific conditions, and poor performance and storage efficiency. This paper addresses these limitations through comprehensive analyses, identifying the mathematical conditions that cause encryption failure, and examining their relationship to the modulus’s randomness. A hybrid encryption approach is proposed in which the linear technique complements the exponential technique, particularly for negative and trivial values. The scheme uses the Carmichael function λ(n) to reduce computational costs and provides a unified decryption algorithm that supports signed-integer operations. The unified decryption formula with rounding operations successfully handles positive and negative values, enabling true homomorphic subtraction alongside existing addition and multiplication properties. Decryption is optimized using a single prime key, enhancing security and reducing complexity. Experimental verification shows that the proposed technique passes all 15 National Institute of Standards and Technology tests, with probability values ranging from 0.122325 to 0.991468. Improvements include a 71.8% reduction in exponent size, 89.5% faster encryption, 67.2% faster decryption, and a 33.4% reduction in storage requirements, making the proposed hybrid technique suitable for resource-constrained secure computation applications.
References
Engineering, vol. 2015, pp. 1-6, 2015.
A. V. Kumar, M. S. Sujith, K. T. Sai, G. Rajesh and D. J. S. Yashwanth. “Secure Multiparty Computation Enabled E-Healthcare System with Homomorphic Encryption”. In: IOP Conference Series: Materials Science and Engineering. IOP Publishing, p. 022079, 2020.
W. Guo, J. Shao, R. Lu, Y. Liu and A. A. Ghorbani. “A privacy-preserving online medical prediagnosis scheme for cloud environment”. IEEE Access, vol. 6, pp. 48946-48957, 2018.
Q. Zhang. “An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption”. In: 2021 2nd International Conference on Computing and Data Science (CDS). IEEE, pp. 616-622, 2021.
A. Pattanshetti. “Review of encryption techniques to enhance data protection in cloud”. Vidhyayana-An International Multidisciplinary Peer-Reviewed E-Journal. vol. 10, no. si4, pp. 84-98, 2025
A. Haddad, M. H. Habaebi, E. A. Elsheikh, M. R. Islam, S. A. Zabidi and F. E. M. Suliman. “E2EE enhanced patient-centric blockchain-based system for EHR management”. Plos One, vol. 19, no. 4, p. e0301371, 2024.
B. M. Singh and J. Natarajan. “A novel secure authentication protocol for e-health records in cloud with a new key generation method and minimized key exchange”. Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 7, p. 101629, 2023.
J. L. Fernández-Alemán, I. C. Señor, P. Á. O. Lozoya and A. Toval. “Security and privacy in electronic health records: A systematic literature review”. Journal of Biomedical Informatics, vol. 46, no. 3, pp. 541-562, 2013.
M. Ali, A. Abbas, M. U. S. Khan and S. U. Khan. “SeSPHR: A methodology for secure sharing of personal health records in the cloud”. IEEE Transactions on Cloud Computing, vol. 9, no. 1, pp. 347-359, 2021.
H. Li, K. Yu, B. Liu, C. Feng, Z. Qin and G. Srivastava. “An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things”. IEEE Journal of Biomedical and Health Informatics, vol. 26, no. 5, pp. 1949-1960, 2022.
B. Rodrigues, I. Amorim, I. Silva and A. Mendes. “Patient-centric health data sovereignty: An approach using proxy re-encryption”. In: S. Katsikas, F. Cuppens, N. Cuppens-Boulahia, C. Lambrinoudakis, J. Garcia-Alfaro, G. Navarro-Arribas, P. Nespoli, C. Kalloniatis, J. Mylopoulos, A. Antón and S. Gritzalis, Eds., Computer Security. ESORICS 2023 International Workshops, Lecture Notes in Computer Science. vol. 14398. Springer Nature, Cham, Switzerland, pp. 199-215, 2024.
H. Jin, Y. Luo, P. Li and J. Mathew. “A review of secure and privacy-preserving medical data sharing”. IEEE Access, vol. 7, pp. 61656- 61669, 2019.
J. H. Cheon, A. Kim, M. Kim and Y. Song. “Homomorphic encryption for arithmetic of approximate numbers”. In: T. Takagi and T. Peyrin, Eds., Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science. vol. 10624. Springer International Publishing, Cham, pp. 409-437, 2017.
D. Huynh. “CKKS Explained, Part 3: Encryption and Decryption - OpenMined”. Available from: https://openmined. org/blog/ckks-explained-part-3-encryption-and-decryption [Last accessed on 2025 Nov 03].
D. Huynh. “CKKS Explained: Part 1, Vanilla Encoding and Decoding”. OpenMined. Available from: https://openmined.org/ blog/ckks-explained-part-1-simple-encoding-and-decoding [Last accessed on 2025 Nov 03].
D. Huynh. “CKKS Explained, Part 5: Rescaling”. OpenMined. Available from: https://openmined.org/blog/ckks-explained-part-5- rescaling [Last accessed on 2025 Nov 03].
Z. T. Omar, F. S. Abed and S. K. Ahmed. “A new asymmetric fully homomorphic encryption scheme for cloud banking data”. Kurdistan Journal of Applied Research, vol. 5, no. 2, pp. 152-165, 2020.
A. T. Jalal and M. A. Mohammed. “Enhanced integer-based homomorphic encryption scheme with windowing mechanism for securing electronic health records”. UHD Journal of Science and Technology, vol. 9, no. 2, pp. 77-91, 2025.
“Modulo”. Available from: https://en.wikipedia.org/w/index.php?title =modulo&oldid=130366402 [Last accessed on 2025 Nov 03].
“Multiplicative Order”. Available from: https://en.wikipedia.org/ wiki/multiplicative_order#citerefnivenzuckermanmontgomery1991 [Last accessed on 2025 Nov 03].
P. K. Siddharth, O. Pal and B. Alam. “A Homomorphic Encryption Scheme over Integers Based on Carmichael’s Theorem”. In: 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT). IEEE, Mysuru, India, pp. 17-20. 2016.
T. Tosun, A. Moradi and E. Savas. “Exploiting the Central Reduction in Lattice-Based Cryptography”. 2024. Available from: https:// eprint.iacr.org/2024/066 [Last accessed on 2025 Nov 03].
J. Chappelon. “On the multiplicative order aⁿ modulo n”. Journal of Integer Sequences, vol. 13, Article 10.2.1, 2010.
D. Boneh. “Twenty years of attacks on the RSA cryptosystem”. Notices of the American Mathematical Society, vol. 46, pp. 203-213, 2002.
R. Imam, Q. M. Areeb, A. Alturki and F. Anwer. “Systematic and critical review of RSA based public key cryptographic schemes: Past and present status”. IEEE Access, vol. 9, pp. 155949-155976, 2021.
E. Barker. ”Recommendation for Key Management: Part 1 – General.” National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800-57pt1r5, 2020.
M. A. Will and R. K. Ko. “Computing Mod without Mod”. Vol. 2014. IACR Cryptology ePrint Archive, California, p. 755, 2014.
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, N. Heckert, J. Dray, S. Vo and L. E. Bassham. “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications”. National Institute of Standards and Technology, United States, 2010.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Abdulrahman Tawfeeq Jalal, Mohammed Anwar Mohammed

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
