Invited Paper: Homomorphic Operations Techniques Yielding Communication Efficiency

Dor Bitan, Shlomi Dolev

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper describes our recent results in information theoretically secure homomorphic encryption. The main question that stands in the basis of these works concerns the possibility of modifying encrypted data obliviously. This possibility is useful for various applications, e.g., multiparty computation, outsourcing of computations, and quantum key distribution (QKD). The works presented here consider the scenario in which a user wishes to outsource the storage and computation of confidential data to an untrusted server. The first two works consider the approach of employing multiple servers and distributing secret shares of the data among the servers. The first work introduces a method for evaluating quadratic functions over a dynamic database, with no communication between the servers. The second work allows communication and considers a method for homomorphic evaluation of polynomials of arbitrary degree over non-zero secret shares in a single round of communication. We present protocols that enable the evaluation of multivariate polynomials over shares of a non-zero secret without requiring a secret sharing phase invoked in an offline preprocessing phase, and deal with possibly-zero secrets in several ways. The third work reviewed here considers the approach of employing a single server. That work assumes that the user and server have quantum capabilities, and attempts to enable the homomorphic evaluation of encrypted classical data using quantum devices. The homomorphic encryption scheme presented in that work is used to construct a QKD scheme resilient against weak measurements. Weak measurement based attacks over known QKD schemes are also introduced in the third work, along with the innovative concept of securing entanglement.

Original languageEnglish
Title of host publicationStabilization, Safety, and Security of Distributed Systems - 22nd International Symposium, SSS 2020, Proceedings
EditorsStéphane Devismes, Neeraj Mittal
PublisherSpringer Science and Business Media Deutschland GmbH
Pages16-28
Number of pages13
ISBN (Print)9783030643478
DOIs
StatePublished - 1 Jan 2020
Event22nd International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2020 - Austin, United States
Duration: 18 Nov 202021 Nov 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12514 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2020
Country/TerritoryUnited States
CityAustin
Period18/11/2021/11/20

Keywords

  • Homomorphic encryption
  • Multiparty computation
  • Quantum computation
  • Quantum key distribution
  • Secret sharing

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Invited Paper: Homomorphic Operations Techniques Yielding Communication Efficiency'. Together they form a unique fingerprint.

Cite this