Processing encrypted data without decryption or encryption
- Technology Benefits
- Confidential data can be processed by a third party without decryption thus maintaining security. Impervious to examination by a hostile adversary.
- Detailed Technology Description
- Processor s configured in this manner will be bespoke configurable for each encryption. The arithmetic tables particular to the encryption are be loaded into fast static memory on the processor in order to service a client who uses a particular private encryption. The client does not reveal the encryption by posting the tables. A processor of this kind can also be run in emulation, as a piece of software, and the same desirable properties accrue. Working in this way, it appears to be a suitably secure means for executing private processes in a cloud computing context. It is envisaged that an encrypted program and encrypted data and the encrypted arithmetic tables are process by the cloud, and encrypted results are returned.
- *Abstract
-
Currently encrypted data needs to be decrypted before data processing such as arithmetic calculations can be carried out. If the data owner is relying on a third party to carry out this processing the potential exists for a breach of data security.
- *Principal Investigator
-
Name: Dr. Peter Breuer
Department:
- Country/Region
- USA
For more information, please click Here

