Obfuscated arbitrary computation using cryptographic primitives

Nektarios Georgios Tsoutsos, Michail Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The breakthrough of fully homomorphic encryption (FHE) enables privacy-preserving arbitrary computation in the cloud, supporting both addition and multiplication over encrypted data. Current FHE implementations, however, suffer from high performance overheads and require expensive boot-strapping operations to decrease ciphertext noise. In this work, we discuss how homomorphic encryption primitives can implement a functionally complete set of homomorphic operations and enable arbitrary computation that is outsourced by a single party. We focus on obfuscated computation with or without special look-up tables, to enable branch decisions over encrypted values while preserving privacy. Since partial homomorphic encryption is orders of magnitude less expensive than FHE, it can be more practical for privacy-preserving applications in the cloud.

Original languageEnglish (US)
Title of host publicationProceeding of 2015 10th International Design and Test Symposium, IDT 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5-8
Number of pages4
ISBN (Electronic)9781467399944
DOIs
StatePublished - Feb 1 2016
Event10th IEEE International Design and Test Symposium, IDT 2015 - Dead Sea, Amman, Jordan
Duration: Dec 14 2015Dec 16 2015

Publication series

NameProceeding of 2015 10th International Design and Test Symposium, IDT 2015

Other

Other10th IEEE International Design and Test Symposium, IDT 2015
CountryJordan
CityDead Sea, Amman
Period12/14/1512/16/15

ASJC Scopus subject areas

  • Hardware and Architecture
  • Electrical and Electronic Engineering
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Obfuscated arbitrary computation using cryptographic primitives'. Together they form a unique fingerprint.

  • Cite this

    Tsoutsos, N. G., & Maniatakos, M. (2016). Obfuscated arbitrary computation using cryptographic primitives. In Proceeding of 2015 10th International Design and Test Symposium, IDT 2015 (pp. 5-8). [7396726] (Proceeding of 2015 10th International Design and Test Symposium, IDT 2015). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IDT.2015.7396726