A Study of Fully Homomorphic Encryption with Evaluation Control

被引:0
|
作者
Phing, Kenneth Ong Kuan [1 ]
Chen, Bo Yu [1 ]
Chi, Po Wen [1 ]
Wang, Chao [1 ]
机构
[1] Natl Taiwan Normal Univ, Comp Sci & Informat Engn, Taipei, Taiwan
关键词
D O I
10.1109/AsiaJCIS64263.2024.00014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fully Homomorphic Encryption (FHE) allows third parties to perform arbitrary computations directly on ciphertexts without decryption, and the decrypted result is equal to the result of the corresponding plaintext computation. Under FHE, data owners ensure that third parties cannot see the original data during computation, thus preventing data leak. However, FHE cannot guarantee that third party will perform computations as the data owner expects. In this paper, we propose an evaluation control scheme applied to FHE. This scheme is based on fully homomorphic evaluation, whereby message duplication and deconstruction to validate if the evaluation result is trustworthy.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [21] Fully Homomorphic Encryption over the Integers
    van Dijk, Marten
    Gentry, Craig
    Halevi, Shai
    Vaikuntanathan, Vinod
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 24 - +
  • [22] An efficient fully homomorphic encryption scheme
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Cherif
    International Journal of Network Security, 2019, 21 (01) : 91 - 99
  • [23] HECO: Fully Homomorphic Encryption Compiler
    Viand, Alexander
    Jattke, Patrick
    Haller, Miro
    Hithnawi, Anwar
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4715 - 4732
  • [24] Fully Homomorphic Encryption with Auxiliary Inputs
    Wang, Fuqun
    Wang, Kunpeng
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 220 - 238
  • [25] Better Bootstrapping in Fully Homomorphic Encryption
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 1 - 16
  • [26] Research Progress of Fully Homomorphic Encryption
    Lifang, Bai
    Yuefei, Zhu
    Yongjun, Li
    Shuai, Wang
    Xiaoqi, Yang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3069 - 3087
  • [27] MULTIKEY FULLY HOMOMORPHIC ENCRYPTION AND APPLICATIONS
    Lopez-Alt, Adriana
    Tromer, Eran
    Vaikuntanathan, Vinod
    SIAM JOURNAL ON COMPUTING, 2017, 46 (06) : 1827 - 1892
  • [28] Leakage Resilient Fully Homomorphic Encryption
    Berkoff, Alexandra
    Liu, Feng-Hao
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 515 - 539
  • [29] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [30] Fully Homomorphic Encryption with Polylog Overhead
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 465 - 482