Abstract

ABSTRACT Two data items a and b are stored on an untrusted database in their encrypted forms and , respectively. It is required that the encryption function be fully homomorphic, that is, E must satisfy the conditions and . This would allow the owner of the data, as well as an untrusted party operating the database on behalf of the owner, to perform operations directly on the encrypted data without the need for decryption. We propose a general framework that allows the derivation of such fully homomorphic functions. Two implementations of the general framework are then described that, in addition to being secure, enjoy the property of being efficient to compute.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.