Publications

Detailed Information

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey

Cited 4 time in Web of Science Cited 10 time in Scopus
Authors

Aloufi, Asma; Hu, Peizhao; Song, Yongsoo; Lauter, Kristin

Issue Date
2022-12
Publisher
Association for Computing Machinary, Inc.
Citation
ACM Computing Surveys, Vol.54 No.9, p. 195
Abstract
With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry's breakthrough discovery of how we might support arbitrary computations on encrypted data, many studies followed and improved various aspects of HE, such as faster bootstrapping and ciphertext packing. However, the topic of how to support secure computations on ciphertexts encrypted under multiple keys does not receive enough attention. This capability is crucial in many application scenarios where data owners want to engage in joint computations and are preferred to protect their sensitive data under their own secret keys. Enabling this capability is a non-trivial task. In this article, we present a comprehensive survey of the state-of-the-artmulti-key techniques and schemes that target different systems and threat models. In particular, we review recent constructions based on Threshold Homomorphic Encryption (ThHE) and Multi-Key Homomorphic Encryption (MKHE). We analyze these cryptographic techniques and schemes based on a new secure outsourced computation model and examine their complexities. We share lessons learned and draw observations for designing better schemes with reduced overheads.
ISSN
0360-0300
URI
https://hdl.handle.net/10371/201193
DOI
https://doi.org/10.1145/3477139
Files in This Item:
There are no files associated with this item.
Appears in Collections:

Related Researcher

  • College of Engineering
  • Dept. of Computer Science and Engineering
Research Area Cryptography, Privacy, Security

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share