Non-interactive Evaluation of Encrypted Elementary Functions

被引:0
|
作者
Chen, Liang [1 ]
Gao, Chengmin [2 ]
Xu, Yong [1 ,2 ]
机构
[1] South China Univ Technol, Sch Engn & Comp Sci, Guangzhou, Guangdong, Peoples R China
[2] Guangdong Police Coll, Dept Comp, Guangzhou, Guangdong, Peoples R China
关键词
mobile code security; Taylor series; non-interactive evaluation of encrypted elementary function; homomorphism encryption;
D O I
10.1109/IAS.2009.36
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile code can be considered composing of functions. Sander et al implemented non-interactive evaluation of encrypted functions(non-interactive EEF) based on homomorphism. But their scheme is limited to encrypting polynomials in positive integer domain. There is no homomorphism that can securely implement non-interactive evaluation of encrypted elementary functions (non-interactive EEEF) in real domain now. In this paper, addition and multiplication homomorphism in real domain bayed on a modified EIGamal are proposed. Then using Taylor series we expand elementary, functions approximately into polynomials, which can be encrypted and computed by the proposed homomorphism non-interactively. Then We implement non-interactive EEEF in real domain.
引用
收藏
页码:45 / +
页数:2
相关论文
共 50 条
  • [1] Non-interactive Opening for Ciphertexts Encrypted by Shared Keys
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 57 - +
  • [2] Efficient machine learning over encrypted data with non-interactive communication
    Park, Heejin
    Kim, Pyung
    Kim, Heeyoul
    Park, Ki-Woong
    Lee, Younho
    [J]. COMPUTER STANDARDS & INTERFACES, 2018, 58 : 87 - 108
  • [3] Non-interactive Private Decision Tree Evaluation
    Tueno, Anselme
    Boev, Yordan
    Kerschbaum, Florian
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 174 - 194
  • [4] Necessary and sufficient conditions for the equality of interactive and non-interactive extensions of continuous functions
    Coroianu, Lucian
    Fuller, Robert
    [J]. FUZZY SETS AND SYSTEMS, 2018, 331 : 116 - 130
  • [5] Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
    Li, Qiming
    Roy, Sujoy
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2010, 2 (04) : 51 - 62
  • [6] Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions
    Landerreche, Esteban
    Stevens, Marc
    Schaffner, Christian
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12059 : 541 - 558
  • [7] Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data
    Zheng, Peijia
    Cheng, Ziyan
    Tian, Xianhao
    Liu, Hongmei
    Luo, Weiqi
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3452 - 3468
  • [8] Boolean functions: noise stability, non-interactive correlation, and mutual information
    Li, Jiange
    Medard, Muriel
    [J]. 2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 266 - 270
  • [9] DEVELOPMENT OF A FUZZY CALCULATOR FOR CONTINUOUS FUNCTIONS OF NON-INTERACTIVE FUZZY VARIABLES
    Scheerlinck, Karolien
    Vernieuwe, Hide
    De Baets, Bernard
    [J]. ICFC 2010/ ICNC 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUZZY COMPUTATION AND INTERNATIONAL CONFERENCE ON NEURAL COMPUTATION, 2010, : 14 - 20
  • [10] MAXIMUM AND MINIMUM BETWEEN FUZZY SYMBOLS IN NON-INTERACTIVE AND WEAKLY NON-INTERACTIVE SITUATIONS
    AMBROSIO, R
    MARTINI, GB
    [J]. FUZZY SETS AND SYSTEMS, 1984, 12 (01) : 27 - 35