A Study of Fully Homomorphic Encryption with Evaluation Control

被引:0
|
作者
Phing, Kenneth Ong Kuan [1 ]
Chen, Bo Yu [1 ]
Chi, Po Wen [1 ]
Wang, Chao [1 ]
机构
[1] Natl Taiwan Normal Univ, Comp Sci & Informat Engn, Taipei, Taiwan
关键词
D O I
10.1109/AsiaJCIS64263.2024.00014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fully Homomorphic Encryption (FHE) allows third parties to perform arbitrary computations directly on ciphertexts without decryption, and the decrypted result is equal to the result of the corresponding plaintext computation. Under FHE, data owners ensure that third parties cannot see the original data during computation, thus preventing data leak. However, FHE cannot guarantee that third party will perform computations as the data owner expects. In this paper, we propose an evaluation control scheme applied to FHE. This scheme is based on fully homomorphic evaluation, whereby message duplication and deconstruction to validate if the evaluation result is trustworthy.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [41] Low Communication Threshold Fully Homomorphic Encryption
    Passelegue, Alain
    Stehle, Damien
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT I, 2025, 15484 : 297 - 329
  • [42] The Implemention and Application of Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Yang, Ming
    Wang, Cai-Ling
    Xu, Shan-Shan
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
  • [43] Batched Fully Homomorphic Encryption from TFHE
    Jiang, Yuting
    Wei, Jianghong
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 92 - 109
  • [44] On DGHV and BGV Fully Homomorphic Encryption Schemes
    Hariss, Khalil
    Chamoun, Maroun
    Samhat, Abed Ellatif
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [45] Practical Fully Homomorphic Encryption for Fully Masked Neural Networks
    Izabachene, Malika
    Sirdey, Renaud
    Zuber, Martin
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 24 - 36
  • [46] Approximating Max Function in Fully Homomorphic Encryption
    Lee, Hyunjun
    Choi, Jina
    Lee, Younho
    ELECTRONICS, 2023, 12 (07)
  • [47] A retrospective analysis on fully homomorphic encryption scheme
    Mittal, Sonam
    Ramkumar, K. R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 223 - 254
  • [48] Fully Homomorphic Encryption Based On the Parallel Computing
    Tan, Delin
    Wang, Huajun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 497 - 522
  • [49] Fully-homomorphic Encryption Based SPIR
    Zhong, Hong
    Yi, Lei
    Zhao, Yu
    Yuan, Xianping
    Sha, Xianjun
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [50] Breaking Fully-Homomorphic-Encryption Challenges
    Nguyen, Phong Q.
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 13 - 14