Main Article Content
Abstract
This paper proposes a lightweight homomorphic encryption (HE) technique designed for secure data transmission in resource-constrained environments such as IoT, sensor networks, and edge computing platforms. The method integrates a modified AES structure—in which the number of rounds and key-expansion operations are optimized—with RSA’s multiplicative homomorphism to support limited encrypted computation while minimizing computational overhead. The modified AES reduces complexity in the Mix Columns and Key Expansion stages without compromising cryptographic soundness. Experiments conducted on a 32-bit ARM-based emulator (100 MHz) and Arduino-class microcontroller demonstrate reduced encryption time, lower energy consumption, and improved throughput compared with standard AES, RSA, and AES+RSA hybrids. Preliminary comparisons with lightweight HE baselines (LWE-based and CKKS variants) indicate promising efficiency advantages for constrained hardware. Security analysis confirms that modifications do not weaken resistance against known cryptanalytic attacks. The resulting framework is suitable for healthcare monitoring, smart grids, industrial IoT, and privacy-preserving cloud analytics.
Keywords
Article Details
Copyright (c) 2025 Sumaira Bashir, Amit Sharma (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
- S. A. Sultana, R. Ch, and R. P. Malleswari, "Keyless lightweight encipher using homomorphic and binomial coefficients for smart computing applications," in 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN), Vellore, India, 2023: IEEE, pp. 1-6, doi: https://doi.org/10.1109/ViTECoN58111.2023.10157660.
- A. A. Bendoukha, O. Stan, R. Sirdey, N. Quero, and L. Freitas, "Practical homomorphic evaluation of block-cipher-based hash functions with applications," in International Symposium on Foundations and Practice of Security, 2022: Springer, pp. 88-103, doi: https://doi.org/10.1007/978-3-031-30122-3_6.
- X. Niu, M. M. Cook, and D. Pezaros, "Examining the suitability of stream ciphers for Modbus-TCP encryption on resource constrained devices," in Proceedings of the 17th European Workshop on Systems Security, 2024: ACM, pp. 51-57, doi: https://doi.org/10.1145/3642974.3652287.
- H. A. Babaeer and S. A. Al-Ahmadi, "Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking," IEEE Access, vol. 8, pp. 92098-92109, 2020, doi: https://doi.org/10.1109/ACCESS.2020.2994587.
- B. O. Soufiene, A. A. Bahattab, A. Trad, and H. Youssef, "LSDA: Lightweight secure data aggregation scheme in healthcare using IoT," in Proceedings of the 10th international conference on information systems and technologies, Lecce, Italy, 2020: ACM, pp. 1-4, doi: https://doi.org/10.1145/3447568.3448530.
- W. Jiang, Z. Yang, Z. Zhou, and J. Chen, "Lightweight data security protection method for AMI in power Internet of Things," Mathematical Problems in Engineering, vol. 2020, p. 8896783, 2020, doi: https://doi.org/10.1155/2020/8896783.
- K. Munjal and R. Bhatia, "A systematic review of homomorphic encryption and its contributions in healthcare industry," Complex & Intelligent Systems, vol. 9, pp. 3759-3786, 2023, doi: https://doi.org/10.1007/s40747-022-00756-z.
- B. Alaya, L. Laouamer, and N. Msilini, "Homomorphic encryption systems statement: Trends and challenges," Computer Science Review, vol. 36, p. 100235, 2020, doi: https://doi.org/10.1016/j.cosrev.2020.100235.
- J. A. Alzubi, O. A. Alzubi, M. Beseiso, A. K. Budati, and K. Shankar, "Optimal multiple key‐based homomorphic encryption with deep neural networks to secure medical data transmission and diagnosis," Expert Systems, vol. 39, no. 4, p. e12879, 2022, doi: https://doi.org/10.1111/exsy.12879.
- A. M. Abukari, I. Zulfawu, E. K. Bankas, and I. Gibrilla, "Improving Security on Election Results Data Transmission via Cloud Using Hybrid Homomorphic Encryption," Earthline Journal of Mathematical Sciences, vol. 14, no. 4, pp. 631-653, 2024, doi: https://doi.org/10.34198/ejms.14424.631653.
- L. Babenko and E. Tolomanenko, "Development of algorithms for data transmission in sensor networks based on fully homomorphic encryption using symmetric Kuznyechik algorithm," Journal of Physics: Conference Series, vol. 1812, p. 012034, 2021, doi: https://doi.org/10.1088/1742-6596/1812/1/012034.
- N. Sammeta and L. Parthiban, "Data ownership and secure medical data transmission using optimal multiple key-based homomorphic encryption with hyperledger blockchain," International Journal of Image and Graphics, vol. 23, no. 3, p. 2240003, 2023, doi: https://doi.org/10.1142/S0219467822400034.
References
S. A. Sultana, R. Ch, and R. P. Malleswari, "Keyless lightweight encipher using homomorphic and binomial coefficients for smart computing applications," in 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN), Vellore, India, 2023: IEEE, pp. 1-6, doi: https://doi.org/10.1109/ViTECoN58111.2023.10157660.
A. A. Bendoukha, O. Stan, R. Sirdey, N. Quero, and L. Freitas, "Practical homomorphic evaluation of block-cipher-based hash functions with applications," in International Symposium on Foundations and Practice of Security, 2022: Springer, pp. 88-103, doi: https://doi.org/10.1007/978-3-031-30122-3_6.
X. Niu, M. M. Cook, and D. Pezaros, "Examining the suitability of stream ciphers for Modbus-TCP encryption on resource constrained devices," in Proceedings of the 17th European Workshop on Systems Security, 2024: ACM, pp. 51-57, doi: https://doi.org/10.1145/3642974.3652287.
H. A. Babaeer and S. A. Al-Ahmadi, "Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking," IEEE Access, vol. 8, pp. 92098-92109, 2020, doi: https://doi.org/10.1109/ACCESS.2020.2994587.
B. O. Soufiene, A. A. Bahattab, A. Trad, and H. Youssef, "LSDA: Lightweight secure data aggregation scheme in healthcare using IoT," in Proceedings of the 10th international conference on information systems and technologies, Lecce, Italy, 2020: ACM, pp. 1-4, doi: https://doi.org/10.1145/3447568.3448530.
W. Jiang, Z. Yang, Z. Zhou, and J. Chen, "Lightweight data security protection method for AMI in power Internet of Things," Mathematical Problems in Engineering, vol. 2020, p. 8896783, 2020, doi: https://doi.org/10.1155/2020/8896783.
K. Munjal and R. Bhatia, "A systematic review of homomorphic encryption and its contributions in healthcare industry," Complex & Intelligent Systems, vol. 9, pp. 3759-3786, 2023, doi: https://doi.org/10.1007/s40747-022-00756-z.
B. Alaya, L. Laouamer, and N. Msilini, "Homomorphic encryption systems statement: Trends and challenges," Computer Science Review, vol. 36, p. 100235, 2020, doi: https://doi.org/10.1016/j.cosrev.2020.100235.
J. A. Alzubi, O. A. Alzubi, M. Beseiso, A. K. Budati, and K. Shankar, "Optimal multiple key‐based homomorphic encryption with deep neural networks to secure medical data transmission and diagnosis," Expert Systems, vol. 39, no. 4, p. e12879, 2022, doi: https://doi.org/10.1111/exsy.12879.
A. M. Abukari, I. Zulfawu, E. K. Bankas, and I. Gibrilla, "Improving Security on Election Results Data Transmission via Cloud Using Hybrid Homomorphic Encryption," Earthline Journal of Mathematical Sciences, vol. 14, no. 4, pp. 631-653, 2024, doi: https://doi.org/10.34198/ejms.14424.631653.
L. Babenko and E. Tolomanenko, "Development of algorithms for data transmission in sensor networks based on fully homomorphic encryption using symmetric Kuznyechik algorithm," Journal of Physics: Conference Series, vol. 1812, p. 012034, 2021, doi: https://doi.org/10.1088/1742-6596/1812/1/012034.
N. Sammeta and L. Parthiban, "Data ownership and secure medical data transmission using optimal multiple key-based homomorphic encryption with hyperledger blockchain," International Journal of Image and Graphics, vol. 23, no. 3, p. 2240003, 2023, doi: https://doi.org/10.1142/S0219467822400034.
