PPTFully Homomorphic Encryption

PPTFully Homomorphic Encryption

ID:40088571

大小:2.33 MB

页数:116页

时间:2019-07-20

PPTFully Homomorphic Encryption_第1页
PPTFully Homomorphic Encryption_第2页
PPTFully Homomorphic Encryption_第3页
PPTFully Homomorphic Encryption_第4页
PPTFully Homomorphic Encryption_第5页
资源描述:

《PPTFully Homomorphic Encryption》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、FullyHomomorphicEncryptionUsingIdealLatticesCraigGentryStanfordUniversity,IBMFieldsInstitute,05/11/09Wouldn’titbeneatifyoucould…Queryencrypteddata?•Storeyourencrypteddataonanuntrustedserver•Querythedata–i.e.,makebooleanqueriesonthedata•Getausefulrespon

2、sefromtheserver,withouttheserverjustsendingallofthedatatoyouFullyHomomorphicEncryptionUsingIdealLattices5/14/2009CraigGentryWouldn’titbeneatifyoucould…Queryencrypteddata?•Storeyourencrypteddataonanuntrustedserver•Querythedata–i.e.,makebooleanqueriesont

3、hedata•Getausefulresponsefromtheserver,withouttheserverjustsendingallofthedatatoyouQuerydataprivately?•Sendanencryptedqueryregardingstoreddata(e.g.,onGoogle’sservers)•GetausefulconciseresponseFullyHomomorphicEncryptionUsingIdealLattices5/14/2009CraigGe

4、ntryWouldn’titbeneatifyoucould…Queryencrypteddata?•Storeyourencrypteddataonanuntrustedserver•Querythedata–i.e.,makebooleanqueriesonthedata•Getausefulresponsefromtheserver,withouttheserverjustsendingallofthedatatoyouQuerydataprivately?•Sendanencryptedqu

5、eryregardingstoreddata(e.g.,onGoogle’sservers)•GetausefulconciseresponseDobothsimultaneously?FullyHomomorphicEncryptionUsingIdealLattices5/14/2009CraigGentryPrivacyHomomorphism(a.k.a.FullyHomomorphicEncryption)Well,here’show:•Privacyhomomorphism:Rivest

6、,AdlemanandDertouzosproposedtheconceptin1978.(Rivest,Shamir,andAdlemanproposedRSAin1977,publishedin1978.)•Assumeyouhavepublic-keyencryptionschemethat,inadditiontoalgorithms(KeyGen,Enc,Dec),hasanefficientalgorithm“Evaluate”,suchthat:Evaluate(pk,C,ψ,…,ψ)

7、≈Enc(pk,C(π,…,π))1t1tforallpk,allcircuitsC,allψ=Encrypt(pk,π).iiFullyHomomorphicEncryptionUsingIdealLattices5/14/2009CraigGentryPrivacyHomomorphismWell,here’show:•Assumeyouhavepublic-keyencryptionschemethat,inadditiontoalgorithms(KeyGen,Enc,Dec),hasane

8、fficientalgorithm“Evaluate”,suchthat:Evaluate(pk,C,ψ,…,ψ)≈Enc(pk,C(π,…,π))1t1tforallpk,allcircuitsC,allψ=Encrypt(pk,π).iiQueryencrypteddata:ØEncryptstoreddata:ψ,…,ψ1tØQuery:sendyourcircuitCØResponse:Eval(pk,C,ψ,…,ψ)1tØDecryptresponse→C(

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。