TY - GEN
T1 - Secure data devolution
T2 - 3rd ACM International Workshop on Security in Cloud Computing, SCC 2015
AU - Yasuda, Masaya
AU - Koshiba, Takeshi
AU - Shimoyama, Takeshi
AU - Kogure, Jun
AU - Yokoyama, Kazuhiro
N1 - Publisher Copyright:
© 2015 ACM.
PY - 2015/4/14
Y1 - 2015/4/14
N2 - Homomorphic encryption can support meaningful operations on encrypted data, and hence it enables users to outsource their data in encrypted format to cloud services. However, homomorphic encryption cannot operate on ciphertexts with different keys in general. To resolve the problem, re-encryption allows operations on such ciphertexts by unifying the different keys into a new one. In this paper, we focus on the scheme proposed by Brakerski and Vaikuntanathan (CRYPTO 2011), and give a practical re-encryption method. Our strategy for efficient re-encryption is to simply rewrite the decryption circuit and then to evaluate the circuit homomorphically with auxiliary information. In particular, our method requires only a few homomorphic operations for re-encryption, and it can be applied to various applications such as secure key exchange for collaboratively computing multiple users' data in the cloud.
AB - Homomorphic encryption can support meaningful operations on encrypted data, and hence it enables users to outsource their data in encrypted format to cloud services. However, homomorphic encryption cannot operate on ciphertexts with different keys in general. To resolve the problem, re-encryption allows operations on such ciphertexts by unifying the different keys into a new one. In this paper, we focus on the scheme proposed by Brakerski and Vaikuntanathan (CRYPTO 2011), and give a practical re-encryption method. Our strategy for efficient re-encryption is to simply rewrite the decryption circuit and then to evaluate the circuit homomorphically with auxiliary information. In particular, our method requires only a few homomorphic operations for re-encryption, and it can be applied to various applications such as secure key exchange for collaboratively computing multiple users' data in the cloud.
KW - Homomorphic encryption
KW - LWE assumption
KW - Re-encryption
KW - Secure key exchange
UR - http://www.scopus.com/inward/record.url?scp=84959292699&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84959292699&partnerID=8YFLogxK
U2 - 10.1145/2732516.2732521
DO - 10.1145/2732516.2732521
M3 - Conference contribution
AN - SCOPUS:84959292699
T3 - SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015
SP - 53
EP - 61
BT - SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015
PB - Association for Computing Machinery, Inc
Y2 - 14 April 2015
ER -