Computing Arbitrary Functions of Encrypted Data

被引:345
|
作者
Gentry, Craig [1 ]
机构
[1] IBM Corp, IJ Watson Res Ctr, Hawthorne, NY USA
关键词
D O I
10.1145/1666420.1666444
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a worker that does not have the secret decryption key to compute any (still encrypted) result of the data, even when the function of the data is very complex. In short, a third party can perform complicated processing of data without being able to see it. Among other things, this helps make cloud computing compatible with privacy.
引用
收藏
页码:97 / 105
页数:9
相关论文
共 50 条
  • [21] A Domain-Specific Language for Computing on Encrypted Data
    Bain, Alex
    Mitchell, John
    Sharma, Rahul
    Stefan, Deian
    Zimmerman, Joe
    IARCS ANNUAL CONFERENCE ON FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE (FSTTCS 2011), 2011, 13 : 6 - 24
  • [22] Continuous-variable quantum computing on encrypted data
    Marshall, Kevin
    Jacobsen, Christian S.
    Schafermeier, Clemens
    Gehring, Tobias
    Weedbrook, Christian
    Andersen, Ulrik L.
    NATURE COMMUNICATIONS, 2016, 7
  • [23] Toward a big data approach for indexing encrypted data in Cloud Computing
    Kaci, Abdellah
    Bouabana-Tebibel, Thouraya
    Rachedi, Abderrezak
    Yahiaoui, Chafia
    SECURITY AND PRIVACY, 2019, 2 (03)
  • [24] Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation
    Shi, Yang
    Han, Jingxuan
    Fan, Hongfei
    Zhao, Qinpei
    Liu, Qin
    IEEE ACCESS, 2016, 4 : 6401 - 6415
  • [25] Encrypted Data Searching Techniques and Approaches for Cloud Computing: A Survey
    Mohan, Lija
    Elayidom, M. Sudheep
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 97 - 104
  • [26] Efficient Machine Learning on Encrypted Data using Hyperdimensional Computing
    Nam, Yujin
    Zhou, Minxuan
    Gupta, Saransh
    De Micheli, Gabrielle
    Cammarota, Rosario
    Wilkerson, Chris
    Micciancio, Daniele
    Rosing, Tajana
    2023 IEEE/ACM INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, ISLPED, 2023,
  • [27] A shareable keyword search over encrypted data in cloud computing
    Xu, Li
    Weng, Chi-Yao
    Yuan, Lun-Pin
    Wu, Mu-En
    Tso, Raylin
    Sun, Hung-Min
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03): : 1001 - 1023
  • [28] Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Li, Jin
    Wang, Qian
    Wang, Cong
    Cao, Ning
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [29] A Computing-in-Memory Engine for Searching on Homomorphically Encrypted Data
    Reis, Dayane
    Niemier, Michael T.
    Hu, Xiaobo Sharon
    IEEE JOURNAL ON EXPLORATORY SOLID-STATE COMPUTATIONAL DEVICES AND CIRCUITS, 2019, 5 (02): : 123 - 131
  • [30] Computing on encrypted data and its applicability to a coalition operations environment
    Bent, Graham
    Bergamaschi, Flavio
    Hunt, Hamish
    GROUND/AIR MULTISENSOR INTEROPERABILITY, INTEGRATION, AND NETWORKING FOR PERSISTENT ISR VI, 2015, 9464