Difference between revisions of "Homomorphic encryption"

From certFHE Community KB
Jump to navigation Jump to search
Line 5: Line 5:
  
 
On the other hand, at first thought encrypting data seems to cancel out the possible benefits of cloud computing unless one gives the cloud the secret decryption key, sacrificing privacy. Fortunately, there are methods of encrypting data in a ''malleable'' way, such that the encryption can be manipulated without decrypting the data.
 
On the other hand, at first thought encrypting data seems to cancel out the possible benefits of cloud computing unless one gives the cloud the secret decryption key, sacrificing privacy. Fortunately, there are methods of encrypting data in a ''malleable'' way, such that the encryption can be manipulated without decrypting the data.
 +
 +
To explain the ideas in a tangible manner, we are going to use a physical analogy: Alice, who owns a jewellery store and wants her workers to process raw precious materials into jewellery pieces. Alice is constantly concerned about giving her workers complete access to the materials in order to minimise the possibility of theft. The analogy was coined by Gentry [https://doi.org/10.1145/1666420.1666444] and we follow the presentation in his paper.
 +
 +
'''Alice's plan'''
 +
 +
Use a transparent impenetrable glovebox [https://www.cleatech.com/wp-content/uploads/2015/12/Mini-Glove-Box-with-Airlock_2-450x308C.jpg see image] secured by a lock for which only Alice has the key.
  
 
== Definition ==
 
== Definition ==
  
 
== Examples ==
 
== Examples ==

Revision as of 07:42, 3 March 2020

Intuitive idea

Suppose one would like to delegate the ability of processing its data without giving away access to it. This type of situation becomes more and more frequent with the widespread use of cloud computing. To store unencrypted data in the cloud is very risky and, for some types of data such as medical records, can even be illegal.

On the other hand, at first thought encrypting data seems to cancel out the possible benefits of cloud computing unless one gives the cloud the secret decryption key, sacrificing privacy. Fortunately, there are methods of encrypting data in a malleable way, such that the encryption can be manipulated without decrypting the data.

To explain the ideas in a tangible manner, we are going to use a physical analogy: Alice, who owns a jewellery store and wants her workers to process raw precious materials into jewellery pieces. Alice is constantly concerned about giving her workers complete access to the materials in order to minimise the possibility of theft. The analogy was coined by Gentry [1] and we follow the presentation in his paper.

Alice's plan

Use a transparent impenetrable glovebox see image secured by a lock for which only Alice has the key.

Definition

Examples