首页> 外文OA文献 >Delegatable homomorphic encryption with applications to secure outsourcing of computation
【2h】

Delegatable homomorphic encryption with applications to secure outsourcing of computation

机译:可委托同态加密及其应用程序,可确保计算外包

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This primitive can be both seen as a public-key counterpart to Verifiable Computation, where input generation and output verification are performed by different entities, or as a generalisation of Fully Homomorphic Encryption enabling control over computations on encrypted data.Our primitive comes with a series of extra features as follows: 1) there is a one-time setup procedure for all circuits; 2) senders do not need to be aware of the functions which will be evaluated on the encrypted data, nor do they need to register keys; 3) tokens are independent of senders and receiver; and 4) receivers are able to verify the correctness of computation given short auxiliary information on the input data and the function, independently of the complexity of the computed circuit.We give a modular construction of such a DHE scheme from three components: Fully Homomorphic Encryption (FHE), Functional Encryption (FE), and a (customised) MAC. As a stepping stone, we first define Verifiable Functional Encryption (VFE), and then show how one can build a secure DHE scheme from a VFE and an FHE scheme. We also show how to build the required VFE from a standard FE together with a MAC scheme. All our results hold in the standard model.Finally, we show how one can build a verifiable computation (VC) scheme generically from a DHE. As a corollary, we getthe first VC scheme which remains verifiable even if the attacker can observe verification results
机译:在这项工作中,我们提出了一种新的密码原语,称为可代同态加密(DHE)。这允许受信机构通过发行令牌来控制/委托对通过加密数据评估电路的能力,将其评估给不可信的工作人员/评估人员。这个原语可以看作是可验证计算的公钥副本,其中输入生成和输出验证由不同的实体执行,或者可以看作是完全同态加密的泛化,可以控制对加密数据的计算。额外的功能如下:1)所有电路都有一次性设置程序; 2)发送者不必知道将对加密数据进行评估的功能,也不需要注册密钥; 3)令牌独立于发送方和接收方;和4)接收器能够在输入数据和功能短的给定辅助信息的情况下验证计算的正确性,而与计算电路的复杂性无关。我们从以下三个方面对这种DHE方案进行了模块化构造:全同态加密(FHE),功能加密(FE)和(定制的)MAC。作为垫脚石,我们首先定义可验证功能加密(VFE),然后说明如何从VFE和FHE方案构建安全的DHE方案。我们还将展示如何从标准FE和MAC方案构建所需的VFE。我们所有的结果都保存在标准模型中。最后,我们展示了如何从DHE通用地构建可验证的计算(VC)方案。必然地,我们获得了第一个VC方案,即使攻击者可以观察到验证结果,该方案仍然可以验证

著录项

  • 作者

    Barbosa Manuel; Farshim P.;

  • 作者单位
  • 年度 2012
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号