Two-Server Delegation of Computation on Label-Encrypted Data
نویسندگان
چکیده
Catalano and Fiore propose a scheme to transform linearly-homomorphic encryption into homomorphic capable of evaluating quadratic computations on ciphertexts. Their is based the (such as Goldwasser-Micali, Paillier ElGamal) need perform large integer operation servers. Then, their have numerous At same time, cannot verify evaluate more than degree-4 computations. To solve these problems, we no longer use which number theory assumptions. We label pseudorandom function encrypt message, significantly reduce servers enable us MACs technology realize verifiable naturally. also extend method construct $d$ -server schemes, allow client delegate degree- outsourced data.
منابع مشابه
Towards Robust Computation on Encrypted Data
Encryption schemes that support computation on encrypted data are useful in constructing efficient and intuitively simple cryptographic protocols. However, the approach was previously limited to stand-alone and/or honest-but-curious security. In this work, we apply recent results on “non-malleable homomorphic encryption” to construct new protocols with Universally Composable security against ac...
متن کاملPrivate Computation on Encrypted Genomic Data
A number of databases around the world currently host a wealth of genomic data that is invaluable to researchers conducting a variety of genomic studies. However, patients who volunteer their genomic data run the risk of privacy invasion. In this work, we give a cryptographic solution to this problem: to maintain patient privacy, we propose encrypting all genomic data in the database. To allow ...
متن کاملTwo Protocols for Delegation of Computation
Consider a weak client that wishes to delegate computation to an untrusted server and be able to succinctly verify the correctness of the result. We present protocols in two relaxed variants of this problem. We first consider a model where the client delegates the computation to two or more servers, and is guaranteed to output the correct answer as long as even a single server is honest. In thi...
متن کاملComputation on Encrypted Data using Data Flow Authentication
Encrypting data before sending it to the cloud protects it against hackers and malicious insiders, but requires the cloud to compute on encrypted data. Trusted (hardware) modules, e.g., secure enclaves like Intel’s SGX, can very efficiently run entire programs in encrypted memory shielding it from the administrator’s view. However, it already has been demonstrated that software vulnerabilities ...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2021
ISSN: ['2168-7161', '2372-0018']
DOI: https://doi.org/10.1109/tcc.2019.2913375