4.6 Review

Computing Arbitrary Functions of Encrypted Data

期刊

COMMUNICATIONS OF THE ACM
卷 53, 期 3, 页码 97-105

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/1666420.1666444

关键词

-

向作者/读者索取更多资源

Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a fully homomorphic encryption scheme that keeps data private, but that allows a worker that does not have the secret decryption key to compute any (still encrypted) result of the data, even when the function of the data is very complex. In short, a third party can perform complicated processing of data without being able to see it. Among other things, this helps make cloud computing compatible with privacy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据