Difference between revisions of "Homomorphic encryption"

From certFHE Community KB
Jump to navigation Jump to search
Line 10: Line 10:
 
'''Alice's plan'''
 
'''Alice's plan'''
  
Use a transparent impenetrable glovebox [https://www.cleatech.com/wp-content/uploads/2015/12/Mini-Glove-Box-with-Airlock_2-450x308C.jpg see image] secured by a lock for which only Alice has the key.
+
Use a transparent impenetrable glovebox [https://www.cleatech.com/wp-content/uploads/2015/12/Mini-Glove-Box-with-Airlock_2-450x308C.jpg (see image)] secured by a lock for which only Alice has the key. Using the gloves, a worker can assemble pieces of jewellery using the materials that were previously locked inside the box by Alice. When the pieces are finished, she unlocks the box with her key and extracts them.
 +
 
 +
The locked glovebox with the raw precious materials inside is an analogy for an encryption of some data [math]m_1, \dots, m_t [/math] '''TODO: Why is this not working?''' which can be accessed only using the decryption key. The gloves should be regarded as the ''malleability'' or the ''homomorphic property'' of the encryption. The finished piece of jewellery in the box can be thought of as the encryption of [math] f(m_1, \dots, m_t) [/math], a desired computation using the initial data. The lack of physical access to the raw precious materials in the box is an analogy for the fact that knowing encryptions of [math]m_1, \dots, m_t [/math] or [math]f(m_1, \dots, m_t) [\math] does not give any information about [math] m_1, \dots, m_t [/math] or [math] f(m_1, \dots, m_t) [/math], without the knowledge of the decryption key.
 +
 
 +
Of course, Alice's jewellery store, like any analogy, does not represent some aspect of homomorphic encryption very well and one does not have to take it too literally. Some flaws of this analogy are discussed in Section 4 of Gentry's aforementioned article.
  
 
== Definition ==
 
== Definition ==
  
 
== Examples ==
 
== Examples ==

Revision as of 08:09, 3 March 2020

Intuitive idea

Suppose one would like to delegate the ability of processing its data without giving away access to it. This type of situation becomes more and more frequent with the widespread use of cloud computing. To store unencrypted data in the cloud is very risky and, for some types of data such as medical records, can even be illegal.

On the other hand, at first thought encrypting data seems to cancel out the possible benefits of cloud computing unless one gives the cloud the secret decryption key, sacrificing privacy. Fortunately, there are methods of encrypting data in a malleable way, such that the encryption can be manipulated without decrypting the data.

To explain the ideas in a tangible manner, we are going to use a physical analogy: Alice, who owns a jewellery store and wants her workers to process raw precious materials into jewellery pieces. Alice is constantly concerned about giving her workers complete access to the materials in order to minimise the possibility of theft. The analogy was coined by Gentry [1] and we follow the presentation in his paper.

Alice's plan

Use a transparent impenetrable glovebox (see image) secured by a lock for which only Alice has the key. Using the gloves, a worker can assemble pieces of jewellery using the materials that were previously locked inside the box by Alice. When the pieces are finished, she unlocks the box with her key and extracts them.

The locked glovebox with the raw precious materials inside is an analogy for an encryption of some data [math]m_1, \dots, m_t [/math] TODO: Why is this not working? which can be accessed only using the decryption key. The gloves should be regarded as the malleability or the homomorphic property of the encryption. The finished piece of jewellery in the box can be thought of as the encryption of [math] f(m_1, \dots, m_t) [/math], a desired computation using the initial data. The lack of physical access to the raw precious materials in the box is an analogy for the fact that knowing encryptions of [math]m_1, \dots, m_t [/math] or [math]f(m_1, \dots, m_t) [\math] does not give any information about [math] m_1, \dots, m_t [/math] or [math] f(m_1, \dots, m_t) [/math], without the knowledge of the decryption key.

Of course, Alice's jewellery store, like any analogy, does not represent some aspect of homomorphic encryption very well and one does not have to take it too literally. Some flaws of this analogy are discussed in Section 4 of Gentry's aforementioned article.

Definition

Examples