Research on Preventing Medical Information from Leaking based on Homomorphic Encryption


  • Kangwei Rao



Medical Information Security, Privacy Protection, Information Encryption, Symmetric Encryption, Asymmetric Encryption, Electronic Medical Records, Medical Images, Key Management, Access Control


The security and privacy protection of medical information is one of the important challenges facing today's society. Disclosure of medical information can lead to invasion of patient privacy, reputational damage to medical institutions, and potential legal liability. Therefore, it is very important to take effective measures to prevent the leakage of medical information. Information encryption is a common technical means, which can effectively protect the security and privacy of medical information. The purpose of this paper is to discuss how to prevent medical information leakage through information encryption. First, we describe the sensitivity and importance of medical information, as well as the current security challenges. Then, we discuss in detail the basic principles of information encryption and common encryption algorithms, including symmetric encryption and asymmetric encryption. Next, we explore the specific application scenarios of medical information encryption, such as electronic medical records, medical images and encryption protection during transmission. We also discuss the advantages and challenges of healthcare information encryption and propose some solutions such as key management and access control. Finally, we summarize the importance of information encryption in preventing medical information leakage and emphasize the need for further research and practice to ensure the security and privacy protection of medical information.


Download data is not yet available.


Gentry, C. (2009). Fully Homomorphic Encryption Using Ideal Lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 169-178.

Boneh, D., & Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. Stanford University.

Gentry, C. (2010). Computing Arbitrary Function of Encrypted Data. Communications of the ACM, 53(3), 97-105.

Stehle, D., & Steinfeld, R. (2010). Faster Fully Homomorphic Encryption. Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 377-394.

Coron, J., Naccache, D., & Tibouchi, M. (2012). Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. In P. David & J. Thomas (Eds.), Advances in Cryptology-EUROCRYPT 2012, 446-464. Springer.

Xia, C. (2013). Research of Homomorphic Encryption Technology and Application. Anhui University, Hefei.

Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 4(11), 169–180.

Coron, J. S., Mandal, A., Naccache, D., & Tibouchi, M. (2011). Fully homomorphic encryption over the integers with shorter public keys. In Annual Cryptology Conf., 487–504.

Chung, K. M., Kalai, Y., & Vadhan, S. (2010). Improved delegation of computation using fully homomorphic encryption. In Advances in Cryptology—CRYPTO 2010, 483-501. Springer.







How to Cite

Rao, K. (2024). Research on Preventing Medical Information from Leaking based on Homomorphic Encryption. Frontiers in Computing and Intelligent Systems, 7(1), 34-38.