Top Banner
Crypto 101 Fully Homomorphic Encryption CryptDB Homomorphic Encryption Ist k¨ unstliche Intelligenz gef¨ ahrlich? Carine Dengler Carine Dengler
95

Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

May 20, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Homomorphic EncryptionIst kunstliche Intelligenz gefahrlich?

Carine Dengler

Carine Dengler

Page 2: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Table of Contents

1 Crypto 101

2 How-to Fully Homomorphic Encryption

3 CryptDBIntroCryptDB

Carine Dengler

Page 3: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

confidentiality

authentication

integrity

non-repudiation

Carine Dengler

Page 4: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

(K , P, C , KeyGen, Enc , Dec)

Carine Dengler

Page 5: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

(K , P, C , KeyGen, Enc , Dec)

keyspace

k ∈ K key

KeyGen outputs k ∈ K s.t. length k ≥ n

Carine Dengler

Page 6: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

PLAINTEXT

(K , P, C , KeyGen, Enc , Dec)

plaintext space

m ∈ P plaintext

Carine Dengler

Page 7: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

(K , P, C , KeyGen, Enc , Dec)

ciphertext space

c ∈ C ciphertext

Carine Dengler

Page 8: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

PLAINTEXT

(K , P, C , KeyGen, Enc , Dec)

encryption algorithm

Enc : K × P → C , (k ,m) 7→ c

Carine Dengler

Page 9: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

PLAINTEXT

(K , P, C , KeyGen, Enc , Dec)

encryption algorithm

Enc : K × P → C , (k ,m) 7→ c

Carine Dengler

Page 10: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

PLAINTEXT

(K , P, C , KeyGen, Enc , Dec)

encryption algorithm

Enc : K × P → C , (k ,m) 7→ c

Carine Dengler

Page 11: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

PLAINTEXT

(K , P, C , KeyGen, Enc , Dec)

decryption algorithm

Dec : K × C → P, (k, c) 7→ m

Carine Dengler

Page 12: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Symmetric Encryption

(K , P, C , KeyGen, Enc , Dec)

DES (Data Encryption Standard)

AES (Advanced Encryption Standard)

Carine Dengler

Page 13: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Asymmetric Encryption

(K , P, C , KeyGen, Enc , Dec)

Carine Dengler

Page 14: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Asymmetric Encryption

(K , P, C , KeyGen, Enc , Dec)

(pk, sk) ∈ K s.t. length pk ≥ n and length sk ≥ n

Carine Dengler

Page 15: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Asymmetric Encryption

PLAINTEXT

(K , P, C , KeyGen, Enc , Dec)

Enc(pk ,m) = c

Carine Dengler

Page 16: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Asymmetric Encryption

PLAINTEXT

(K , P, C , KeyGen, Enc , Dec)

Dec(sk , c) = m

Carine Dengler

Page 17: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Asymmetric Encryption

(K , P, C , KeyGen, Enc , Dec)

RSA

ElGamal

Carine Dengler

Page 18: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Correctness

PLAINTEXTPLAINTEXT

Dec(k ,Enc(k ,m)) = m, k ∈ K ,m ∈ P

Carine Dengler

Page 19: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Correctness

PLAINTEXTPLAINTEXT

Dec(sk ,Enc(pk,m)) = m, (pk, sk) ∈ K ,m ∈ P

Carine Dengler

Page 20: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Kerckhoff’s Principle

Carine Dengler

Page 21: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Table of Contents

1 Crypto 101

2 How-to Fully Homomorphic Encryption

3 CryptDBIntroCryptDB

Carine Dengler

Page 22: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

PLAINTEXT PLAINTEXT

∀f ∈ F and ci with Enc(pk,mi ) = ci ,mi ∈ P, i = 1, . . . , t :Eval(pk, f , c1, ..., ct) = cEval s.t.Dec(sk , cEval) = f (m1, ...,mt)

ElGamal

Carine Dengler

Page 23: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

(K ,P,C ,KeyGen,Enc ,Dec ,Eval , F)

∀f ∈ F and ci with Enc(pk,mi ) = ci ,mi ∈ P, i = 1, . . . , t :Eval(pk, f , c1, ..., ct) = cEval s.t.Dec(sk , cEval) = f (m1, ...,mt)

ElGamal

Carine Dengler

Page 24: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

PLAINTEXT PLAINTEXT

∀f ∈ F and ci with Enc(pk,mi ) = ci ,mi ∈ P, i = 1, . . . , t :Eval(pk, f , c1, ..., ct) = cEval s.t.Dec(sk , cEval) = f (m1, ...,mt)

ElGamal

Carine Dengler

Page 25: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

PLAINTEXT PLAINTEXT

∀f ∈ F and ci with Enc(pk,mi ) = ci ,mi ∈ P, i = 1, . . . , t :Eval(pk, f , c1, ..., ct) = cEval s.t.Dec(sk , cEval) = f (m1, ...,mt)

ElGamal

Carine Dengler

Page 26: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Requirements

manipulations

leaked information

Carine Dengler

Page 27: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Starting Point

f can be expressed as a boolean circuit

evaluate gates for x , y ∈ {0, 1}AND(x , y) = xyOR(x , y) = 1− (1− x)(1− y)NOT(x , y) = 1− x

Carine Dengler

Page 28: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Starting Point

f can be expressed as a boolean circuit

evaluate gates for x , y ∈ {0, 1}AND(x , y) = xyOR(x , y) = 1− (1− x)(1− y)NOT(x , y) = 1− x

Carine Dengler

Page 29: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme (Symmetric)

KeyGen(n) = p s.t. p ∈ Z, p odd

Enc(p,m) = m′ + pq, m ∈ {0, 1} with m′ n-bit lengthnumber s.t. m′ mod 2 = m mod 2, q random number

Dec(p, c) = (c mod p) mod 2

c mod p = m′ noise associated to c

m′ ∈ (−p2 ,

p2 )

Carine Dengler

Page 30: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme (Symmetric)

KeyGen(n) = p s.t. p ∈ Z, p odd

Enc(p,m) = m′ + pq, m ∈ {0, 1} with m′ n-bit lengthnumber s.t. m′ mod 2 = m mod 2, q random number

Dec(p, c) = (c mod p) mod 2

c mod p = m′ noise associated to c

m′ ∈ (−p2 ,

p2 )

Carine Dengler

Page 31: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme (Symmetric)

KeyGen(n) = p s.t. p ∈ Z, p odd

Enc(p,m) = m′ + pq, m ∈ {0, 1} with m′ n-bit lengthnumber s.t. m′ mod 2 = m mod 2, q random number

Dec(p, c) = (c mod p) mod 2

c mod p = m′ noise associated to c

m′ ∈ (−p2 ,

p2 )

Carine Dengler

Page 32: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme (Symmetric)

KeyGen(n) = p s.t. p ∈ Z, p odd

Enc(p,m) = m′ + pq, m ∈ {0, 1} with m′ n-bit lengthnumber s.t. m′ mod 2 = m mod 2, q random number

Dec(p, c) = (c mod p) mod 2

c mod p = m′ noise associated to c

m′ ∈ (−p2 ,

p2 )

Carine Dengler

Page 33: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme (Symmetric)

KeyGen(n) = p s.t. p ∈ Z, p odd

Enc(p,m) = m′ + pq, m ∈ {0, 1} with m′ n-bit lengthnumber s.t. m′ mod 2 = m mod 2, q random number

Dec(p, c) = (c mod p) mod 2

c mod p = m′ noise associated to c

m′ ∈ (−p2 ,

p2 )

Carine Dengler

Page 34: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme (Symmetric)

KeyGen(n) = p s.t. p ∈ Z, p odd

Enc(p,m) = m′ + pq, m ∈ {0, 1} with m′ n-bit lengthnumber s.t. m′ mod 2 = m mod 2, q random number

Dec(p, c) = (c mod p) mod 2

c mod p = m′ noise associated to c

m′ ∈ (−p2 ,

p2 )

Carine Dengler

Page 35: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme (Symmetric)

KeyGen(n) = p s.t. p ∈ Z, p odd

Enc(p,m) = m′ + pq, m ∈ {0, 1} with m′ n-bit lengthnumber s.t. m′ mod 2 = m mod 2, q random number

Dec(p, c) = (c mod p) mod 2

c mod p = m′ noise associated to c

m′ ∈ (−p2 ,

p2 )

Carine Dengler

Page 36: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

Add(c1, c2) = c1 + c2, Sub(c1, c2) = c1 − c2,Mult(c1, c2) = c1c2

Mult(c1, c2) = m′1m

′2 + pq′ with m′

i noise associated to ci ,i = 1, 2

f +(c1, c2, ..., ct) = f +(m′1,m

′2, ...,m

′t) + pq with m′

i noiseassociated to ci , i = 1, 2, ..., t

Carine Dengler

Page 37: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

Add(c1, c2) = c1 + c2, Sub(c1, c2) = c1 − c2,Mult(c1, c2) = c1c2

Mult(c1, c2) = m′1m

′2 + pq′ with m′

i noise associated to ci ,i = 1, 2

f +(c1, c2, ..., ct) = f +(m′1,m

′2, ...,m

′t) + pq with m′

i noiseassociated to ci , i = 1, 2, ..., t

Carine Dengler

Page 38: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

Add(c1, c2) = c1 + c2, Sub(c1, c2) = c1 − c2,Mult(c1, c2) = c1c2

Mult(c1, c2) = m′1m

′2 + pq′ with m′

i noise associated to ci ,i = 1, 2

f +(c1, c2, ..., ct) = f +(m′1,m

′2, ...,m

′t) + pq with m′

i noiseassociated to ci , i = 1, 2, ..., t

Carine Dengler

Page 39: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

Add(c1, c2) = c1 + c2, Sub(c1, c2) = c1 − c2,Mult(c1, c2) = c1c2

Mult(c1, c2) = m′1m

′2 + pq′ with m′

i noise associated to ci ,i = 1, 2

f +(c1, c2, ..., ct) = f +(m′1,m

′2, ...,m

′t) + pq with m′

i noiseassociated to ci , i = 1, 2, ..., t

Carine Dengler

Page 40: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

Add(c1, c2) = c1 + c2, Sub(c1, c2) = c1 − c2,Mult(c1, c2) = c1c2

Mult(c1, c2) = m′1m

′2 + pq′ with m′

i noise associated to ci ,i = 1, 2

f +(c1, c2, ..., ct) = f +(m′1,m

′2, ...,m

′t) + pq with m′

i noiseassociated to ci , i = 1, 2, ..., t

Carine Dengler

Page 41: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

Add(c1, c2) = c1 + c2, Sub(c1, c2) = c1 − c2,Mult(c1, c2) = c1c2

Mult(c1, c2) = m′1m

′2 + pq′ with m′

i noise associated to ci ,i = 1, 2

f +(c1, c2, ..., ct) = f +(m′1,m

′2, ...,m

′t) + pq with m′

i noiseassociated to ci , i = 1, 2, ..., t

Carine Dengler

Page 42: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme(Asymmetric)

KeyGen(n) = (pk, sk)

sk = p

pk list of encryptions of 0

Enc(pk ,m) = m +∑

pki∈I pki with I random subset

Carine Dengler

Page 43: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme(Asymmetric)

KeyGen(n) = (pk, sk)

sk = p

pk list of encryptions of 0

Enc(pk ,m) = m +∑

pki∈I pki with I random subset

Carine Dengler

Page 44: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme(Asymmetric)

KeyGen(n) = (pk, sk)

sk = p

pk list of encryptions of 0

Enc(pk ,m) = m +∑

pki∈I pki with I random subset

Carine Dengler

Page 45: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Somewhat Homomorphic Encryption Scheme(Asymmetric)

KeyGen(n) = (pk, sk)

sk = p

pk list of encryptions of 0

Enc(pk ,m) = m +∑

pki∈I pki with I random subset

Carine Dengler

Page 46: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Noise

the noise becomes too large (|f +(m′1, ...,m

′t)| >

p2 )

decryption removes noise

Carine Dengler

Page 47: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Noise

the noise becomes too large (|f +(m′1, ...,m

′t)| >

p2 )

decryption removes noise

Carine Dengler

Page 48: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Solution

bootstrappable

circular-secure

F = {Dec ,DecAdd,DecSub,DecMult}c1 = Enc(pk,m)

sk = Enc(pk, ski )

Recrypt(pk,Dec , sk , c1)

c1 = Enc(pk , c1i )c = Eval(pk ,Dec , sk , c1)

Carine Dengler

Page 49: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Solution

bootstrappable

circular-secure

F = {Dec ,DecAdd,DecSub,DecMult}c1 = Enc(pk,m)

sk = Enc(pk, ski )

Recrypt(pk,Dec , sk , c1)

c1 = Enc(pk , c1i )c = Eval(pk ,Dec , sk , c1)

Carine Dengler

Page 50: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Solution

F = {Dec ,DecAdd,DecSub,DecMult}

c1 = Enc(pk,m)

sk = Enc(pk, ski )

Recrypt(pk,Dec , sk , c1)

c1 = Enc(pk , c1i )c = Eval(pk ,Dec , sk , c1)

Carine Dengler

Page 51: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Solution

F = {Dec ,DecAdd,DecSub,DecMult}c1 = Enc(pk,m)

sk = Enc(pk, ski )

Recrypt(pk,Dec , sk , c1)

c1 = Enc(pk , c1i )c = Eval(pk ,Dec , sk , c1)

Carine Dengler

Page 52: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Solution

F = {Dec ,DecAdd,DecSub,DecMult}c1 = Enc(pk,m)

sk = Enc(pk, ski )

Recrypt(pk,Dec , sk , c1)

c1 = Enc(pk , c1i )c = Eval(pk ,Dec , sk , c1)

Carine Dengler

Page 53: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Solution

F = {Dec ,DecAdd,DecSub,DecMult}c1 = Enc(pk,m)

sk = Enc(pk, ski )

Recrypt(pk,Dec , sk , c1)

c1 = Enc(pk , c1i )c = Eval(pk ,Dec , sk , c1)

Carine Dengler

Page 54: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

c1 = Enc(pk,m1), c2 = Enc(pk,m2)

c1 = Enc(pk, c1i ), c2 = Enc(pk , c2i )

c = Eval(pk,DecAdd, sk , c1, c2)

c = Enc(pk, (m1 + m2) mod 2)

Carine Dengler

Page 55: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

c1 = Enc(pk,m1), c2 = Enc(pk,m2)

c1 = Enc(pk, c1i ), c2 = Enc(pk , c2i )

c = Eval(pk,DecAdd, sk , c1, c2)

c = Enc(pk, (m1 + m2) mod 2)

Carine Dengler

Page 56: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

c1 = Enc(pk,m1), c2 = Enc(pk,m2)

c1 = Enc(pk, c1i ), c2 = Enc(pk , c2i )

c = Eval(pk,DecAdd, sk , c1, c2)

c = Enc(pk, (m1 + m2) mod 2)

Carine Dengler

Page 57: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Operations

c1 = Enc(pk,m1), c2 = Enc(pk,m2)

c1 = Enc(pk, c1i ), c2 = Enc(pk , c2i )

c = Eval(pk,DecAdd, sk , c1, c2)

c = Enc(pk, (m1 + m2) mod 2)

Carine Dengler

Page 58: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Fully Homomorphic Encryption Scheme

express f as circuit

arrange its gates into levels

evaluate the levels sequentially

Carine Dengler

Page 59: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Fully Homomorphic Encryption Scheme

express f as circuit

arrange its gates into levels

evaluate the levels sequentially

Carine Dengler

Page 60: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Fully Homomorphic Encryption Scheme

express f as circuit

arrange its gates into levels

evaluate the levels sequentially

Carine Dengler

Page 61: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

But . . .

the noise of Dec is � p2

Dec(p, c) = (c mod p) mod 2 = (c − b cp e) mod 2 ⇔LSB(c) XOR LSB(b cp e)b cp e

Carine Dengler

Page 62: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

But . . .

the noise of Dec is � p2

Dec(p, c) = (c mod p) mod 2 = (c − b cp e) mod 2 ⇔LSB(c) XOR LSB(b cp e)b cp e

Carine Dengler

Page 63: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

But . . .

the noise of Dec is � p2

Dec(p, c) = (c mod p) mod 2 = (c − b cp e) mod 2 ⇔LSB(c) XOR LSB(b cp e)b cp e

Carine Dengler

Page 64: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

But . . .

the noise of Dec is � p2

Dec(p, c) = (c mod p) mod 2 = (c − b cp e) mod 2 ⇔LSB(c) XOR LSB(b cp e)b cp e

Carine Dengler

Page 65: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

But . . .

the noise of Dec is � p2

Dec(p, c) = (c mod p) mod 2 = (c − b cp e) mod 2 ⇔LSB(c) XOR LSB(b cp e)b cp e

Carine Dengler

Page 66: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

make the decryption function simpler

include a hint about the secret integer p

Carine Dengler

Page 67: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

KeyGen with parameters α, β

(pk, sk) with sk = p

Y = {y1, ..., yβ}, yi ∈ Q s.t. ∃J ⊂ {1, ..., β} with∑j∈J yj = 1

p mod 2 and | J |= α

x ∈ {0, 1}β with Hamming weight α

Carine Dengler

Page 68: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

KeyGen with parameters α, β

(pk, sk) with sk = p

Y = {y1, ..., yβ}, yi ∈ Q s.t. ∃J ⊂ {1, ..., β} with∑j∈J yj = 1

p mod 2 and | J |= α

x ∈ {0, 1}β with Hamming weight α

Carine Dengler

Page 69: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

KeyGen with parameters α, β

(pk, sk) with sk = p

Y = {y1, ..., yβ}, yi ∈ Q s.t. ∃J ⊂ {1, ..., β} with∑j∈J yj = 1

p mod 2 and | J |= α

x ∈ {0, 1}β with Hamming weight α

Carine Dengler

Page 70: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

KeyGen with parameters α, β

(pk, sk) with sk = p

Y = {y1, ..., yβ}, yi ∈ Q s.t. ∃J ⊂ {1, ..., β} with∑j∈J yj = 1

p mod 2 and | J |= α

x ∈ {0, 1}β with Hamming weight α

Carine Dengler

Page 71: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

KeyGen with parameters α, β

(pk, sk) with sk = p

Y = {y1, ..., yβ}, yi ∈ Q s.t. ∃J ⊂ {1, ..., β} with∑j∈J yj = 1

p mod 2 and | J |= α

x ∈ {0, 1}β with Hamming weight α

Carine Dengler

Page 72: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

Encrypt(pk,m) = m

z s.t. zi = cyi mod 2, i ∈ {1, ..., β}

Carine Dengler

Page 73: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

Dec(x , z , c) = LSB(c)XOR LSB(b∑

xizie)∑xizi =

∑cxiyi = c

p mod 2

Carine Dengler

Page 74: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

Dec(x , z , c) = LSB(c)XOR LSB(b∑

xizie)∑xizi =

∑cxiyi = c

p mod 2

Carine Dengler

Page 75: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

Dec(x , z , c) = LSB(c)XOR LSB(b∑

xizie)∑xizi =

∑cxiyi = c

p mod 2

Carine Dengler

Page 76: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Hint

replace multiplication by summation

if α is small enough, the noise is small enough

Carine Dengler

Page 77: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Table of Contents

1 Crypto 101

2 How-to Fully Homomorphic Encryption

3 CryptDBIntroCryptDB

Carine Dengler

Page 78: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

Database-backed Application

AS DBMS

PLAINTEXT

QUERY

RESULT

Carine Dengler

Page 79: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

Threats

AS DBMS

PLAINTEXT

QUERY

RESULT

Carine Dengler

Page 80: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

Threats

AS DBMS

PLAINTEXT

QUERY

RESULT

Carine Dengler

Page 81: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

Key Ideas

SQL-aware encryption strategy

adjustable query-based encryption

chaining encryption keys to user passwords

Carine Dengler

Page 82: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

Intro

Architecture

AS DBMSPROXY

QUERY

QUERY

RESPONSERESULT

Carine Dengler

Page 83: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

SQL-aware Encryption

DATA

ONION EQ

DATA

ONION SEARCH

DATA

ONION ORD

DATA

ONION ADD

Random (RND)

Homomorphic encryption (HOM)

Word search (SEARCH)

Deterministic (DET)

Join (JOIN and OPE-JOIN)

Order-preserving encryption (OPE)

Carine Dengler

Page 84: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Adjustable Query-based Encryption

DATA

ONION EQ

DATA

ONION SEARCH

DATA

ONION ORD

DATA

ONION ADD

Carine Dengler

Page 85: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Adjustable Query-based Encryption

DATA

ONION EQ

DATA

JOIN

Carine Dengler

Page 86: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Query Execution

AS PROXY

QUERY

Carine Dengler

Page 87: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Query Execution

PROXY

QUERY QUERY

Carine Dengler

Page 88: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Query Execution

PROXY DBMS

Carine Dengler

Page 89: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Query Execution

AS DBMSPROXY

QUERY

RESPONSE

RESULT

Carine Dengler

Page 90: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Access Policy

principal

annotations

delegation rules

Carine Dengler

Page 91: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Key Chaining

BOB

SYMSYM

SYM SYM

ALICE

Carine Dengler

Page 92: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Key Chaining

SYM

SYM

ALICE

BOB

Carine Dengler

Page 93: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Security

sensitive data

revealed information

compromise

Carine Dengler

Page 94: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Further Reading I

Buchmann, J.Einfuhrung in die Kryptographie

Katz, J., Lindell, Y.Introduction to Modern Cryptgraphy

Beutelspacher A., Schwenk, J., Wolfenstetter, K.-D.Moderne Verfahren der Kryptographie

Petrlic, R., Sorge C.Datenschutz. Einfuhrung in technischen Datenschutz,Datenschutzrecht und angewandte Kryptographie

I Illustrations in section Crypto 101 based on descriptions in theworks listed above.

Carine Dengler

Page 95: Homomorphic Encryption - Ist ... - Heidelberg University · Crypto 101Fully Homomorphic Encryption CryptDB Table of Contents 1 Crypto 101 2 How-to Fully Homomorphic Encryption 3 CryptDB

Crypto 101 Fully Homomorphic Encryption CryptDB

CryptDB

Further Reading II

Gentry, C.Computing Arbitrary Functions of Encrypted DataIllustrations in section Fully Homomorphic Encryption basedon descriptions in this work.

Popa, R. A., Redfield, C. M. S., Zeldovich, N., Balakrishnan,H.CryptDB: Protecting Confidentiality with Encrypted QueryProcessingIllustrations in section CryptDB based on descriptions andillustrations in this work.

Carine Dengler