homomorphic encryption
play

Homomorphic Encryption Prepared by: Walid A. Hanafy Under - PowerPoint PPT Presentation

Homomorphic Encryption Prepared by: Walid A. Hanafy Under supervision of Professor Mohamed E. Mahmoud Cryptographic Goals The Goal is to allow the computations on the encrypted data. i.e. E


  1. Homomorphic Encryption Prepared by: Walid A. Hanafy Under supervision of Professor Mohamed E. Mahmoud

  2. Cryptographic Goals • The Goal is to allow the computations on the encrypted data. • i.e. E 𝑛 � ⊙ 𝑛 � � 𝐹 𝑛 � ⊙ 𝐹�𝑛 � � • Homomorphic Encryption is classified into 3 categories: • Partially Homomorphic: (Only one operation, for unlimited number of executions) • Somewhat Homomorphic: (Multiple operations for a limited number of executions) 2 • Fully Homomorphic: (Multiple operations for an unlimited number of executions)

  3. Partially Homomorphic • Multiplicatively Homomorphic • RSA • El Gamal • Additively Homomorphic • Paillier* * The Paillier Cryptosystem can execute multiplication if only 𝑛 � is encrypted 3

  4. Properties of Paillier Crypto • Depends on hardness of Factorization Problem and The composite residuosity problem. • Encrypted messages are unlinkable 4

  5. Applications • Computation offloading • Secure Data Aggregation: • Smart Metering Infrastructure privacy preservation • E‐Voting 5

  6. How It Works 6

  7. Correctness Proof of Paillier Cryptosystem 7

  8. Preliminaries(1/4): 8

  9. Preliminaries(2/4): 9

  10. Preliminaries(3/4): 10

  11. Preliminaries(4/4): 11

  12. Decryption Phase (1/2) 12

  13. Decryption Phase (2/2) 13

  14. Homomorphism Properties 14

  15. Paper under review • In this paper the homomorphic is applied in three methods: • Spatial Aggregation • Temporal Aggregation • Spatio‐Temporal Aggregation • However, this paper added to the basic HM scheme a threshold condition (Threshold Decryption) 15

  16. Aggregating Spatial Reading (1/2) • For a set of smart meters 𝑡𝑛 � 𝑡𝑛 � , 𝑡𝑛 � , . . , 𝑡𝑛 � , For every interval 𝑞 each meter generates n‐1 random numbers, then each sm computes the following • Then for encryption: where h is the hashed version of 𝑞 . 16

  17. Aggregating Spatial Reading (2/2) • Aggregation: • Given that: 17

  18. Aggregating Temporal Reading • Random Number generation: • Coping with Malfunctions using a third party: 18

  19. Spatio‐Temporal 19

  20. Performance Analysis of Three schemes • Note this scheme is collusion safe as long as colluding parties is less than N‐2. 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend