4.6 Review

Computing Arbitrary Functions of Encrypted Data

Journal

COMMUNICATIONS OF THE ACM
Volume 53, Issue 3, Pages 97-105

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/1666420.1666444

Keywords

-

Ask authors/readers for more resources

Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a fully homomorphic encryption scheme that keeps data private, but that allows a worker that does not have the secret decryption key to compute any (still encrypted) result of the data, even when the function of the data is very complex. In short, a third party can perform complicated processing of data without being able to see it. Among other things, this helps make cloud computing compatible with privacy.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available