Evaluating Encrypted Boolean Functions on Encrypted Bits: Secure Decision-making on the Black side

نویسندگان

  • Rajesh Krishnan
  • Ravi Sundaram
چکیده

We present a novel approach for secure evaluation of encrypted Boolean functions on encrypted bits. Building upon Barrington’s work to transform circuits to group programs and the Feige-Kilian-Naor cryptographic protocol, our novel Fixed Structure Group Program construction for secure evaluation eliminates the need for an expensive Universal Circuit to hide the function. Elements on the Black side weave together and multiply two coordinated streams of random sequences of elements from an unsolvable group; the Boolean decision is recovered while preserving the confidentiality of the decision function and the input bits. The operation is fast and can be further sped up using parallel computation. Our approach can handle expressions with NC 1 complexity, which is the class of Acyclic Boolean Circuits with polynomial width and logarithmic depth in the size of the input. This efficiently parallelizable class includes nonmonotone Boolean expressions of equality, inequality/range, Hamming distance, Boolean matrix multiplication, and kof-m threshold matching operations. The combined benefits of scaling and expressivity of our approach enables secure decision-making on the Black side. Envisioned applications include confidential publish/subscribe systems (with empirically validated performance), secure content-oriented internetworks, confidential forwarding and firewalling rules, and cross-domain guards.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

On The Secure Evaluation Of Encrypted Polynomials Over Z/nZ DRAFT

An interesting application of cryptography is in the reduction of software piracy and the protection of intellectual property within executable code. Many techniques have been developed for software protection, none of which have provable security and are often circumvented relatively easily by a malicious party. Provably secure software protection is achievable via cryptographic methods, somet...

متن کامل

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013