4.7 Article

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey

期刊

ACM COMPUTING SURVEYS
卷 54, 期 9, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3477139

关键词

Homomorphic encryption; privacy; security; cloud computing

向作者/读者索取更多资源

This article discusses the importance and applications of homomorphic encryption (HE), addresses the issue of secure computations on ciphertexts encrypted under multiple keys, and provides a comprehensive survey and analysis of the latest multi-key techniques and schemes.
With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry's breakthrough discovery of how we might support arbitrary computations on encrypted data, many studies followed and improved various aspects of HE, such as faster bootstrapping and ciphertext packing. However, the topic of how to support secure computations on ciphertexts encrypted under multiple keys does not receive enough attention. This capability is crucial in many application scenarios where data owners want to engage in joint computations and are preferred to protect their sensitive data under their own secret keys. Enabling this capability is a non-trivial task. In this article, we present a comprehensive survey of the state-of-the-artmulti-key techniques and schemes that target different systems and threat models. In particular, we review recent constructions based on Threshold Homomorphic Encryption (ThHE) and Multi-Key Homomorphic Encryption (MKHE). We analyze these cryptographic techniques and schemes based on a new secure outsourced computation model and examine their complexities. We share lessons learned and draw observations for designing better schemes with reduced overheads.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据