首页>
外国专利>
TECHNIQUES FOR SECURELY EXECUTING CODE THAT OPERATES ON ENCRYPTED DATA ON A PUBLIC COMPUTER
TECHNIQUES FOR SECURELY EXECUTING CODE THAT OPERATES ON ENCRYPTED DATA ON A PUBLIC COMPUTER
展开▼
机译:安全地执行在公共计算机上加密数据的代码的技术
展开▼
页面导航
摘要
著录项
相似文献
摘要
Techniques, for secure processing of encrypted data on public resources, include receiving first data indicating a sequence of reversible q-bit gates including a first segment for decrypting, a second segment for operating on the decrypted data, and a third segment for encrypting the resulting data. Second data indicates rules for replacing a first sequence of two gates operating on at least one shared bit of an input N-bit word with a different second sequence of one or more gates that produce the same output N-bit word. The second data is used to propagate: a gate from the first segment a distance into the second segment or beyond; and, a gate from the third segment a distance into the second segment or before. This produces an obfuscated sequence of reversible gates. Obfuscated instructions based on the obfuscated sequence of gates are sent to the public resources.
展开▼