loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Michael Brenner ; Jan Wiebelitz ; Gabriele von Voigt and Matthew Smith

Affiliation: Research Center L3S and Gottfried Wilhelm Leibniz Universitaet Hannover, Germany

ISBN: 978-989-8425-71-3

Keyword(s): Homomorphic encryption, Secret program execution, Secure function evaluation, Encrypted processor.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Secure Cloud Computing ; Security and Privacy in IT Outsourcing

Abstract: Currently generic executable programs can only be encrypted during transmission and storage. To execute the program itself and the data it operates on must be decrypted. If the execution system is not trusted or compromised, both the program code and data are endangered. Recent advances in homomorphic cryptography show how additions and multiplications can be executed in encrypted space, i.e. without decrypting the information, the arithmetic operations themselves are not encrypted. To date, a universal implementation of a homomorphic system, capable of executing arbitrary programs and allowing for practical experiences is still missing. In this paper we present the first method to compute a non-linear arbitrary secret program on an untrusted resource using fully homomorphic encrypted circuits. We use our own implementation of the Smart-Gentry crypto-system as a foundation and define a processor architecture which is capable of executing encrypted programs on encrypted data. Unlike ot her approaches, such as static one-pass boolean circuit simulations, our system supports read and write memory access, dynamic parameters and non-linear programs, that render branch-decisions at runtime and cannot be represented in a circuit with hard-wired in-circuit parameters and data. Our implementation comprises the runtime environment for an encrypted program and an assembler to generate the encrypted machine code. The system represents a first step to show the capabilities of homomorphic encryption in software and system architecture. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.82.10.219

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Brenner M., Wiebelitz J., von Voigt G. and Smith M. (2011). A SMART-GENTRY BASED SOFTWARE SYSTEM FOR SECRET PROGRAM EXECUTION.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 238-244. DOI: 10.5220/0003445802380244

@conference{secrypt11,
author={Michael Brenner and Jan Wiebelitz and Gabriele von Voigt and Matthew Smith},
title={A SMART-GENTRY BASED SOFTWARE SYSTEM FOR SECRET PROGRAM EXECUTION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={238-244},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003445802380244},
isbn={978-989-8425-71-3},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A SMART-GENTRY BASED SOFTWARE SYSTEM FOR SECRET PROGRAM EXECUTION
SN - 978-989-8425-71-3
AU - Brenner M.
AU - Wiebelitz J.
AU - von Voigt G.
AU - Smith M.
PY - 2011
SP - 238
EP - 244
DO - 10.5220/0003445802380244

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.