Processing encrypted data without decryption or encryption
- 技术优势
- Confidential data can be processed by a third party without decryption thus maintaining security. Impervious to examination by a hostile adversary.
- 详细技术说明
- Processor s configured in this manner will be bespoke configurable for each encryption. The arithmetic tables particular to the encryption are be loaded into fast static memory on the processor in order to service a client who uses a particular private encryption. The client does not reveal the encryption by posting the tables. A processor of this kind can also be run in emulation, as a piece of software, and the same desirable properties accrue. Working in this way, it appears to be a suitably secure means for executing private processes in a cloud computing context. It is envisaged that an encrypted program and encrypted data and the encrypted arithmetic tables are process by the cloud, and encrypted results are returned.
- *Abstract
-
Currently encrypted data needs to be decrypted before data processing such as arithmetic calculations can be carried out. If the data owner is relying on a third party to carry out this processing the potential exists for a breach of data security.
- *Principal Investigation
-
Name: Dr. Peter Breuer
Department:
- 国家/地区
- 美国
欲了解更多信息,请点击 这里
