We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field F-p can be jointly computed on encrypted data using an additively homomorphic encryption scheme. Our protocol is secure against malicious adversaries. To motivate and illustrate applications of this technique, we demonstrate an attack on a class of known protocols showing how to compromise location privacy of honest users by manipulating messages in protocols with additively homomorphic encryption. We evaluate our approach using a prototypical implementation. The results show that the added overhead of our approach is small compared to insecure outsourced multiplication
The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch be...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
With the rapid development of cloud computing, the privacy security incidents occur frequently, espe...
If a secure and efficient fully homomorphic encryption algorithm exists, it should be the ultimate s...
Web-servers are a dominant medium of modern communication and thus process vast amounts of highly se...
An additive and multiplicative privacy homomorphism is an encryption function mapping addition and m...
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted i...
Fully homomorphic encryption (FHE) allows arbitrary computations on encrypted data. The standard sec...
With a practical homomorphic encryption algorithm, cloud service providers can operate on users\u27 ...
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected ...
The issue of the privacy-preserving of information has become more prominent, especially regarding t...
A framework is introduced for efficiently computing with encrypted data. We assume a semi-honest sec...
Abstract. We show a technique to transform a linearly-homomorphic encryption into a homomorphic encr...
We present a new multiparty computation protocol secure against a static and malicious dishonest maj...
Secure computation on encrypted data stored on untrusted clouds is an important goal. Existing secur...
The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch be...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
With the rapid development of cloud computing, the privacy security incidents occur frequently, espe...
If a secure and efficient fully homomorphic encryption algorithm exists, it should be the ultimate s...
Web-servers are a dominant medium of modern communication and thus process vast amounts of highly se...
An additive and multiplicative privacy homomorphism is an encryption function mapping addition and m...
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted i...
Fully homomorphic encryption (FHE) allows arbitrary computations on encrypted data. The standard sec...
With a practical homomorphic encryption algorithm, cloud service providers can operate on users\u27 ...
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected ...
The issue of the privacy-preserving of information has become more prominent, especially regarding t...
A framework is introduced for efficiently computing with encrypted data. We assume a semi-honest sec...
Abstract. We show a technique to transform a linearly-homomorphic encryption into a homomorphic encr...
We present a new multiparty computation protocol secure against a static and malicious dishonest maj...
Secure computation on encrypted data stored on untrusted clouds is an important goal. Existing secur...
The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch be...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
With the rapid development of cloud computing, the privacy security incidents occur frequently, espe...