TY - GEN
T1 - Memory-bounded randomness for hardware-constrained encrypted computation
AU - Tsoutsos, Nektarios Georgios
AU - Mazonka, Oleg
AU - Maniatakos, Michail
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/11/22
Y1 - 2017/11/22
N2 - Encrypted computation enables processing sensitive data directly in the encrypted domain, which allows outsourcing to third parties without compromising privacy. Recent solutions that leverage partial homomorphic encryption, however, require excessive lookup tables or obfuscated software oracles to implement branching over encrypted control values. To address these limitations and make encrypted computations more practical on memory-constrained systems, we present a novel approach for limiting the amount of randomness in probabilistic ciphertexts, using number theory primitives and hash tables. This allows de-randomizing probabilistic ciphertexts and define a new encrypted abstract machine that is memory-friendly to the target system. Compared to obfuscated oracles in previous work, our method performs control flow decisions over ciphertexts twice as fast, while requiring selectively small lookup tables.
AB - Encrypted computation enables processing sensitive data directly in the encrypted domain, which allows outsourcing to third parties without compromising privacy. Recent solutions that leverage partial homomorphic encryption, however, require excessive lookup tables or obfuscated software oracles to implement branching over encrypted control values. To address these limitations and make encrypted computations more practical on memory-constrained systems, we present a novel approach for limiting the amount of randomness in probabilistic ciphertexts, using number theory primitives and hash tables. This allows de-randomizing probabilistic ciphertexts and define a new encrypted abstract machine that is memory-friendly to the target system. Compared to obfuscated oracles in previous work, our method performs control flow decisions over ciphertexts twice as fast, while requiring selectively small lookup tables.
KW - Abstract machine
KW - Bounded randomness
KW - Encrypted computation
KW - One instruction set computing
KW - Paillier encryption
UR - http://www.scopus.com/inward/record.url?scp=85041679920&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85041679920&partnerID=8YFLogxK
U2 - 10.1109/ICCD.2017.117
DO - 10.1109/ICCD.2017.117
M3 - Conference contribution
AN - SCOPUS:85041679920
T3 - Proceedings - 35th IEEE International Conference on Computer Design, ICCD 2017
SP - 673
EP - 680
BT - Proceedings - 35th IEEE International Conference on Computer Design, ICCD 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 35th IEEE International Conference on Computer Design, ICCD 2017
Y2 - 5 November 2017 through 8 November 2017
ER -