Two-Server Delegation of Computation on Label-Encrypted Data

04/26/2021
by   Xin Chen, et al.
0

Catalano and Fiore propose a scheme to transform a linearly-homomorphic encryption into a homomorphic encryption scheme capable of evaluating quadratic computations on ciphertexts. Their scheme is based on the linearly-homomorphic encryption (such as Goldwasser-Micali, Paillier and ElGamal) and need to perform large integer operation on servers. Then, their scheme have numerous computations on the servers. At the same time, their scheme cannot verify the computations and cannot evaluate more than degree-4 computations. To solve these problems, we no longer use linearly-homomorphic encryption which based on number theory assumptions. We use label and pseudorandom function to encrypt message, which significantly reduce the computations on the servers and enable us to use homomorphic MACs technology to realize verifiable computations naturally. We also extend the method to construct d-server schemes, which allow the client to delegate degree-d computations on outsourced data.

READ FULL TEXT
research
04/25/2021

Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials

Homomorphic secret sharing (HSS) allows multiple input clients to secret...
research
02/14/2018

Sub-logarithmic Distributed Oblivious RAM with Small Block Size

Oblivious RAM (ORAM) is a cryptographic primitive that allows a client t...
research
03/16/2023

HE is all you need: Compressing FHE Ciphertexts using Additive HE

Fully Homomorphic Encryption (FHE) permits the evaluation of an arbitrar...
research
06/09/2018

TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service

Machine learning methods are widely used for a variety of prediction pro...
research
04/19/2023

Neural Network Quantisation for Faster Homomorphic Encryption

Homomorphic encryption (HE) enables calculating on encrypted data, which...
research
04/21/2023

Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection

Huge diagrams have unique properties for organizations and research, suc...
research
05/04/2021

Verifiable Computing Using Computation Fingerprints Within FHE

We suggest using Fully Homomorphic Encryption (FHE) to be used, not only...

Please sign up or login with your details

Forgot password? Click here to reset