Homomorphic Encryption Prepared by: Walid A. Hanafy Under - - PowerPoint PPT Presentation

homomorphic encryption
SMART_READER_LITE
LIVE PREVIEW

Homomorphic Encryption Prepared by: Walid A. Hanafy Under - - PowerPoint PPT Presentation

Homomorphic Encryption Prepared by: Walid A. Hanafy Under supervision of Professor Mohamed E. Mahmoud Cryptographic Goals The Goal is to allow the computations on the encrypted data. i.e. E


slide-1
SLIDE 1

Homomorphic Encryption

Prepared by: Walid A. Hanafy Under supervision of Professor Mohamed E. Mahmoud

slide-2
SLIDE 2

Cryptographic Goals

  • The Goal is to allow the computations on the encrypted data.
  • i.e. E 𝑛 ⊙ 𝑛 𝐹 𝑛 ⊙ 𝐹𝑛
  • Homomorphic Encryption is classified into 3 categories:
  • Partially Homomorphic: (Only one operation, for unlimited number of executions)
  • Somewhat Homomorphic: (Multiple operations for a limited number of executions)
  • Fully Homomorphic: (Multiple operations for an unlimited number of executions)

2

slide-3
SLIDE 3

Partially Homomorphic

  • Multiplicatively Homomorphic
  • RSA
  • El Gamal
  • Additively Homomorphic
  • Paillier*

* The Paillier Cryptosystem can execute multiplication if only 𝑛 is encrypted

3

slide-4
SLIDE 4

Properties of Paillier Crypto

  • Depends on hardness of Factorization Problem and The composite

residuosity problem.

  • Encrypted messages are unlinkable

4

slide-5
SLIDE 5

Applications

  • Computation offloading
  • Secure Data Aggregation:
  • Smart Metering Infrastructure privacy preservation
  • E‐Voting

5

slide-6
SLIDE 6

How It Works

6

slide-7
SLIDE 7

Correctness Proof of Paillier Cryptosystem

7

slide-8
SLIDE 8

Preliminaries(1/4):

8

slide-9
SLIDE 9

Preliminaries(2/4):

9

slide-10
SLIDE 10

Preliminaries(3/4):

10

slide-11
SLIDE 11

Preliminaries(4/4):

11

slide-12
SLIDE 12

Decryption Phase (1/2)

12

slide-13
SLIDE 13

Decryption Phase (2/2)

13

slide-14
SLIDE 14

Homomorphism Properties

14

slide-15
SLIDE 15

Paper under review

  • In this paper the homomorphic is applied in three methods:
  • Spatial Aggregation
  • Temporal Aggregation
  • Spatio‐Temporal Aggregation
  • However, this paper added to the basic HM scheme a threshold

condition (Threshold Decryption)

15

slide-16
SLIDE 16

Aggregating Spatial Reading (1/2)

  • For a set of smart meters 𝑡𝑛 𝑡𝑛, 𝑡𝑛, . . , 𝑡𝑛 , For every

interval 𝑞 each meter generates n‐1 random numbers, then each sm computes the following

  • Then for encryption:

where h is the hashed version of 𝑞.

16

slide-17
SLIDE 17

Aggregating Spatial Reading (2/2)

17

  • Aggregation:
  • Given that:
slide-18
SLIDE 18

Aggregating Temporal Reading

  • Random Number generation:
  • Coping with Malfunctions using a third party:

18

slide-19
SLIDE 19

Spatio‐Temporal

19

slide-20
SLIDE 20

Performance Analysis of Three schemes

  • Note this scheme is collusion safe as long as colluding parties is less

than N‐2.

20