2022
DOI: 10.48550/arxiv.2207.14071
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Verifiable Encodings for Secure Homomorphic Analytics

Abstract: Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is not ensured. We propose two error detection encodings and build authenticators that enable practical client-verification of cloud-based homomorphic computations under different trade-offs and without compromising on the features of the encryption algorithm. Our… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 106 publications
0
4
0
Order By: Relevance
“…As the main contributions in this paper we have adopted the recent construction MGHE from [17] to generate a verifiable variation built upon the ideas from [6]. We also adapted the work from [15] to improve the efficiency of the most expensive operations, namely the product and the relinearization algorithms.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…As the main contributions in this paper we have adopted the recent construction MGHE from [17] to generate a verifiable variation built upon the ideas from [6]. We also adapted the work from [15] to improve the efficiency of the most expensive operations, namely the product and the relinearization algorithms.…”
Section: Discussionmentioning
confidence: 99%
“…Our approach is inspired by the proposal Veritas [6] and the use of homomorphic authenticators started by Gennaro and Wichs in [13]. Here we will use a homomorphic authenticator called replication encoding which can be described, informally, as follows: for each input message, one generates an extended vector a random half of which is filled with challenge values whereas the other half is filled with copies of the original message.…”
Section: Homomorphic Authenticatorsmentioning
confidence: 99%
See 2 more Smart Citations