Secure cloud computations: Description of (fully)homomorphic ciphers within the P-adic model of encryption
نویسندگان
چکیده
In this paper we consider the description of homomorphic and fully homomorphic ciphers in the p-adic model of encryption. This model describes a wide class of ciphers, but certainly not all. Homomorphic and fully homomorphic ciphers are used to ensure the credibility of remote computing, including cloud technology. The model describes all homomorphic ciphers with respect to arithmetic and coordinatewise logical operations in the ring of p-adic integers Zp. We show that there are no fully homomorphic ciphers for each pair of the considered set of arithmetic and coordinate-wise logical operations on Zp. We formulate the problem of constructing a fully homomorphic cipher as follows. We consider a homomorphic cipher with respect to operation "∗" on Zp. Then, we describe the complete set of operations "G", for which the cipher is homomorphic. As a result, we construct a fully homomorphic cipher with respect to the operations "∗" and "G". We give a description of all operations "G", for which we obtain fully homomorphic ciphers with respect to the operations "+" and "G" from the homomorphic cipher constructed with respect to the operation "+". We also present examples of such "new" operations. keywords: p-adics, p-adic functions, homomorphic ciphers, fully homomorphic ciphers, dynamical systems, 1-Lipschitz
منابع مشابه
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملBlind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption
Secure function evaluation (SFE) is the process of computing a function (or running an algorithm) on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsou...
متن کاملTwin Clouds: An Architecture for Secure Cloud Computing
Cloud computing promises a more cost effective enabling technology to outsource storage and computations. Existing approaches for secure outsourcing of data and arbitrary computations are either based on a single tamper-proof hardware, or based on recently proposed fully homomorphic encryption. The hardware based solutions are not scaleable, and fully homomorphic encryption is currently only of...
متن کاملFailures in Cloud Computing
Cloud computing promises a more cost effective enabling technology to outsource storage and computations. Existing approaches for secure outsourcing of data and arbitrary computations are either based on a single tamper-proof hardware, or based on recently proposed fully homomorphic encryption. The hardware based solutions are not scaleable, and fully homomorphic encryption is currently only of...
متن کاملFully Homomorphic Encryption for Secure Computations in Protected Database
Outsourced computations and, more particularly, cloud computations, are widespread nowadays. That is why the problem of keeping the data security arises. Multiple fully homomorphic cryptosystems were proposed in order to perform secret computations in untrusted environments. But most of the existent solutions are practically inapplicable as they require huge computation resources and produce bi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1603.07699 شماره
صفحات -
تاریخ انتشار 2016