Have a personal or library account? Click to login
Oblivious Lookup-Tables Cover

Abstract

Evaluating arbitrary functions on encrypted data is one of the holy grails of cryptography, with Fully Homomorphic Encryption (FHE) being probably the most prominent and powerful example. FHE, in its current state is, however, not efficient enough for practical applications. On the other hand, simple homomorphic and somewhat homomorphic approaches are not powerful enough to support arbitrary computations.

We propose a new approach towards a practicable system for evaluating functions on encrypted data. Our approach allows to chain an arbitrary number of computations, which makes it more powerful than existing efficient schemes. As with basic FHE we do not encrypt or in any way hide the function, that is evaluated on the encrypted data. It is, however, sufficient that the function description is known only to the evaluator. This situation arises in practice for software as a Software as a Service (SaaS)-scenarios, where an evaluator provides a function only known to him and the user wants to protect his data. Another application might be the analysis of sensitive data, such as medical records.

In this paper we restrict ourselves to functions with only one input parameter, which allow arbitrary transformations on encrypted data.

DOI: https://doi.org/10.1515/tmmp-2016-0039 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 191 - 203
Submitted on: Nov 2, 2015
Published on: Feb 25, 2017
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2017 Markus Stefan Wamser, Stefan Rass, Peter Schartner, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.