2017
DOI: 10.1109/tifs.2016.2647223
|View full text |Cite
|
Sign up to set email alerts
|

Number Theoretic Transforms for Secure Signal Processing

Abstract: Multimedia contents are inherently sensitive signals that must be protected whenever they are outsourced to an untrusted environment. This problem becomes a challenge when the untrusted environment must perform some processing on the sensitive signals; a paradigmatic example is Cloud-based signal processing services. Approaches based on Secure Signal Processing (SSP) address this challenge by proposing novel mechanisms for signal processing in the encrypted domain and interactive secure protocols to achieve th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 37 publications
(23 citation statements)
references
References 50 publications
0
23
0
Order By: Relevance
“…In [5], we proposed a fully unattended solution, based on RLWE (Ring Learning with Errors) cryptosystems [6], which is able to homomorphically evaluate the PRNU extraction/detection without the need of the intervention of the secret key owner in the middle of the process. To this aim, we resort to the pre-/post processing introduced in [7] and the homomorphic Wavelet-denoising proposed in [8].…”
Section: Our Fully Unattended Solutionmentioning
confidence: 99%
“…In [5], we proposed a fully unattended solution, based on RLWE (Ring Learning with Errors) cryptosystems [6], which is able to homomorphically evaluate the PRNU extraction/detection without the need of the intervention of the secret key owner in the middle of the process. To this aim, we resort to the pre-/post processing introduced in [7] and the homomorphic Wavelet-denoising proposed in [8].…”
Section: Our Fully Unattended Solutionmentioning
confidence: 99%
“…Precisely, as in many real scenarios the number of required operations is known beforehand, SHE turns out to be a perfect fit. Furthermore, many optimizations have been incorporated and, consequently, lattice-based SHE/FHE cryptosystems are being progressively adopted by researchers in the field [7,[29][30][31]. In particular, RLWE-based cryptosystems show nowadays the best runtime performance.…”
Section: Univariate Rlwe and Homomorphic Encryptionmentioning
confidence: 99%
“…Additionally, whenever we reduce modulo q and work over R q , we can impose (for the sake of efficiency) that both polynomials functions x 64 + 1 and y 27 + 5 factor in linear terms enabling the use of variants of the NTT. Additionally, slot encoding and slot manipulations are still possible in the plaintext ring by means of the pre-/post-processing, as presented in [7]. Analogously to the negayclic convolution, these pre-/post-processing steps preserve the properties of the NTT transform over a ring with an α-generalized convolution [36].…”
Section: Secure Multivariate Rlwe Instantiationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The NTT can be effectively used in the lossless medical image transmission by water marking approach [2]. The NTT's effectiveness has been proven in the images lossless transmission and in convolution fast calculation [3] The NTT combined with lattice based cryptosystems performs cyclic, negacyclic and convolutions in encrypted domain [4].NTT algorithm are improvised for the float value transforms for Fourier, Hartley, Sine and Cosine signals [5] This paper proposes the design of convolution based on NTT algorithm using the VHDL coding. The VHDL coding of the FFT based convolution is time consuming in design and occupies more number of multipliers and adders.…”
Section: Introductionmentioning
confidence: 99%