Abstract
We study the problem of computing with encrypted data. We propose a hiding scheme that allows a client to execute a simple loop program with real or complex inputs securely on a server. This is the first hiding scheme that we are aware of that applies to real and complex data. The scheme allows the client to efficiently determine with high probability whether the results returned by the server are correct. The scheme we propose uses new techniques that have not been used previously in this context.
Original language | English (US) |
---|---|
Title of host publication | Proceedings of SPIE - The International Society for Optical Engineering |
Editors | E.M. Carapezza |
Pages | 517-527 |
Number of pages | 11 |
Volume | 5071 |
DOIs | |
State | Published - 2003 |
Event | Sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Defense and Law Enforcement II - Orlando, FL, United States Duration: Apr 21 2003 → Apr 25 2003 |
Other
Other | Sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Defense and Law Enforcement II |
---|---|
Country/Territory | United States |
City | Orlando, FL |
Period | 4/21/03 → 4/25/03 |
Keywords
- Encryption
- Hiding
- Security
- Tamper resistance
ASJC Scopus subject areas
- Electrical and Electronic Engineering
- Condensed Matter Physics