Computing Arbitrary Functions of Encrypted Data

被引:345
|
作者
Gentry, Craig [1 ]
机构
[1] IBM Corp, IJ Watson Res Ctr, Hawthorne, NY USA
关键词
D O I
10.1145/1666420.1666444
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a worker that does not have the secret decryption key to compute any (still encrypted) result of the data, even when the function of the data is very complex. In short, a third party can perform complicated processing of data without being able to see it. Among other things, this helps make cloud computing compatible with privacy.
引用
收藏
页码:97 / 105
页数:9
相关论文
共 50 条
  • [41] New construction of secure range query on encrypted data in cloud computing
    Wang, Shao-Hui
    Han, Zhi-Jie
    Chen, Dan-Wei
    Wang, Ru-Chuan
    Tongxin Xuebao/Journal on Communications, 2015, 36 (02):
  • [42] Implementation of Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Shekokar, Narendra
    Sampat, Kunjita
    Chandawalla, Chandni
    Shah, Jahnavi
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 499 - 505
  • [43] Verifiable Ranked Search Over Dynamic Encrypted Data in Cloud Computing
    Liu, Qin
    Nie, Xiaohong
    Liu, Xuhui
    Peng, Tao
    Wu, Jie
    2017 IEEE/ACM 25TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2017,
  • [44] Authorized Private Keyword Search over Encrypted Data in Cloud Computing
    Li, Ming
    Yu, Shucheng
    Cao, Ning
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
  • [45] A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys
    Wang, Boyang
    Li, Ming
    Chow, Sherman S. M.
    Li, Hui
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 337 - 345
  • [46] Privacy-preserving multikey computing framework for encrypted data in the cloud
    Zhang, Jun
    Jiang, Zoe L.
    Li, Ping
    Yiu, Siu Ming
    INFORMATION SCIENCES, 2021, 575 : 217 - 230
  • [47] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [48] Investigating the Application of One Instruction Set Computing for Encrypted Data Computation
    Tsoutsos, Nektarios Georgios
    Maniatakos, Michail
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 21 - 37
  • [49] SECURE ENCRYPTED TRANSMISSION OF NETWORK DATA IN CLOUD COMPUTING TECHNOLOGY ENVIRONMENT
    MIAO Z.
    ZHAO C.
    Scalable Computing, 2024, 25 (04): : 2671 - 2678
  • [50] Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey
    Aloufi, Asma
    Hu, Peizhao
    Song, Yongsoo
    Lauter, Kristin
    ACM COMPUTING SURVEYS, 2022, 54 (09)