Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

07/17/2020
by   Asma Aloufi, et al.
0

New cryptographic techniques such as homomorphic encryption (HE) allow computations to be outsourced to and evaluated blindfolded in a resourceful cloud. These computations often require private data owned by multiple participants, engaging in joint evaluation of some functions. For example, Genome-Wide Association Study (GWAS) is becoming feasible because of recent proliferation of genome sequencing technology. Due to the sensitivity of genomic data, these data should be encrypted using different keys. However, supporting computation on ciphertexts encrypted under multiple keys is a non-trivial task. In this paper, we present a comprehensive survey on different state-of-the-art cryptographic techniques and schemes that are commonly used. We review techniques and schemes including Attribute-Based Encryption (ABE), Proxy Re-Encryption (PRE), Threshold Homomorphic Encryption (ThHE), and Multi-Key Homomorphic Encryption (MKHE). We analyze them based on different system and security models, and examine their complexities. We share lessons learned and draw observations for designing better schemes with reduced overheads.

READ FULL TEXT

page 13

page 14

page 18

page 23

page 25

page 29

page 36

page 40

research
11/11/2019

Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys

Homomorphic encryption (HE) is a promising cryptographic technique for e...
research
07/20/2021

RansomClave: Ransomware Key Management using SGX

Modern ransomware often generate and manage cryptographic keys on the vi...
research
10/08/2020

Partitioned Private User Storages in End-to-End Encrypted Online Social Networks

In secure Online Social Networks (OSN), often end-to-end encryption appr...
research
12/15/2020

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

Memory was captured from a system infected by ransomware and its content...
research
11/13/2022

OpenPGP Email Forwarding Via Diverted Elliptic Curve Diffie-Hellman Key Exchanges

An offline OpenPGP user might want to forward part or all of their email...
research
07/20/2023

Threshold Encrypted Mempools: Limitations and Considerations

Encrypted mempools are a class of solutions aimed at preventing or reduc...
research
02/12/2019

Achieving GWAS with Homomorphic Encryption

One way of investigating how genes affect human traits would be with a g...

Please sign up or login with your details

Forgot password? Click here to reset