Fully Homomorphic Encryption in Real World Applications (Computer Architecture and Design Methodologies) 🔍
Ayantika Chatterjee, Khin Mi Mi Aung Springer Singapore : Imprint: Springer, Computer Architecture and Design Methodologies, Computer Architecture and Design Methodologies, 1, 2019
英语 [en] · PDF · 3.4MB · 2019 · 📘 非小说类图书 · 🚀/duxiu/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
描述
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.
Erscheinungsdatum: 08.04.2019
备用文件名
lgli/N:\!genesis_\0day\springer\10.1007%2F978-981-13-6393-1.pdf
备用文件名
lgrsnf/N:\!genesis_\0day\springer\10.1007%2F978-981-13-6393-1.pdf
备用文件名
nexusstc/Fully Homomorphic Encryption in Real World Applications/0177fdb80e06c84708f4048877dbd139.pdf
备用文件名
scihub/10.1007/978-981-13-6393-1.pdf
备用文件名
zlib/no-category/Ayantika Chatterjee, Khin Mi Mi Aung/Fully Homomorphic Encryption in Real World Applications_5246881.pdf
备选标题
Handbook of Research on Cloud Infrastructures for Big Data Analytics (Advances in Data Mining and Database Management Book Series)
备选标题
459827_1_En_Print.indd
备选作者
Chatterjee, Ayantika, Aung, Khin Mi Mi
备选作者
Deka, Ganesh Chandra; Raj, Pethuru
备选作者
Pethuru Raj, Ganesh Chandra Deka
备选作者
0002624
备选作者
Raj_
备用出版商
Information Science Reference, an imprint of IGI Global
备用出版商
Springer Science + Business Media Singapore Pte Ltd
备用出版商
Springer Nature Singapore
备用出版商
COPYRIGHT
备用版本
Advances in data mining and database management (ADMDM) book series, Hershey, Pennsylvania, 2014
备用版本
Advances in data mining and database management (ADMDM) book series, Hershey, Pa, c 2014
备用版本
Computer Architecture and Design Methodologies, 1st ed. 2019, Singapore, 2019
备用版本
United States, United States of America
备用版本
Springer Nature, Singapore, 2019
备用版本
IGI Global, Hershey, PA, 2014
备用版本
1st ed. 2019, FR, 2019
备用版本
Berlin, Germany, 2019
备用版本
Singapore, Singapore
备用版本
14, 20190329
备用版本
Apr 01, 2019
备用版本
1, PS, 2014
元数据中的注释
sm74922024
元数据中的注释
producers:
Acrobat Distiller 10.0.0 (Windows)
元数据中的注释
{"container_title":"Computer Architecture and Design Methodologies","content":{"parsed_at":1699659746,"source_extension":"epub"},"edition":"1","isbns":["9789811363924","9789811363931","9811363927","9811363935"],"issns":["2367-3478","2367-3486"],"last_page":141,"publisher":"Springer","series":"Computer Architecture and Design Methodologies"}
元数据中的注释
Source title: Fully Homomorphic Encryption in Real World Applications (Computer Architecture and Design Methodologies)
备用描述
Contents 6
1 Introduction 9
1.1 Homomorphic Encryption in Real Applications: Few Case Studies 11
1.2 Summary of This Book 14
References 15
2 Literature Survey 16
2.1 FHE in Cloud Computing 16
2.2 Mathematical Background 17
2.2.1 Somewhat Homomorphic Encryption 19
2.3 Few Related Works 23
2.4 FHE in Practical Algorithms 25
2.5 Conclusion 25
References 26
3 Sorting on Encrypted Data 29
3.1 FHE Comparison Based Sort 31
3.1.1 Homomorphic Form of Sorting 33
3.2 Sorting and Security 34
3.2.1 The CPA Indistinguishability Experiment 34
3.2.2 Why Comparison Based Sorting is Secured? 36
3.3 Partition Based Sorting with Index Encryption 37
3.3.1 Encrypted Array with Encrypted Index 38
3.3.2 Problems of Recursion on Encrypted Data 38
3.3.3 Quick Sort Using Encrypted Stack 40
3.3.4 Encrypted Quick Sort Implementation 42
3.4 Timing Requirement for Sorting Schemes on Encrypted Data 43
3.4.1 Performance Analysis of Different Operations 44
3.4.2 Further Reduction of Recrypt to Introduce Error 45
3.4.3 Encrypted Insertion Sort 48
3.5 Conclusion 51
References 52
4 Translating Algorithms to Handle Fully Homomorphic Encrypted Data 54
4.1 Challenges of Executing Encrypted Programs 55
4.2 Encrypted Variants of Basic Operators 55
4.3 Encrypted Bitwise and Assignment Operators 57
4.4 Encrypted Arithmetic Operators 57
4.4.1 Encrypted Addition and Subtraction 57
4.4.2 Encrypted Multiplication 58
4.4.3 Encrypted Division 58
4.5 Encrypted Relational Operators 60
4.5.1 Encrypted Comparison Operation 60
4.5.2 Encrypted Less Than/Greater Than Operator (FHE_Grt and FHE_Less) 62
4.6 Loop Handling on Encrypted Operations 63
4.7 Encrypted Program Termination Using Interrupt 67
4.8 Recursion Handling with Encrypted Operations 69
4.8.1 Design of Encrypted Stack 70
4.9 Design of Encrypted Queue 70
4.10 Design of Encrypted Linked List 70
4.11 Conclusion 74
References 75
5 Secure Database Handling 76
5.1 Security Issues in Cloud 77
5.2 Sate of the Art 77
5.3 Basic Operations for Database Handling and Their Encrypted Variants 81
5.3.1 INSERT and SELECT Operation 82
5.3.2 TOP 85
5.3.3 LIKE 87
5.3.4 ORDER BY 87
5.3.5 GROUP BY 87
5.4 Advanced SQL: Encrypted JOIN 88
5.5 SQL Injection on Encrypted Database 89
5.6 Conclusion 90
References 90
6 FURISC: FHE Encrypted URISC Design 92
6.1 Existing Encrypted Processors 92
6.1.1 Heroic: Partial Homomorphic Encrypted Processor 93
6.2 Implementing Fully Homomorphic Encrypted Processor Using a Ultimate RISC Instruction 95
6.2.1 Justification of Encrypted Processor Along with Encrypted Data 96
6.2.2 Why URISC Architecture in Connection to FHE 96
6.2.3 Performance Based Challenge 97
6.3 Design Basics of FURISC 99
6.3.1 Design of FURISC 100
6.3.2 Encrypted Memory Module 101
6.3.3 Encrypted ALU Module 102
6.3.4 Overall Architecture 103
6.4 Comparison with MOVE Based URISC 104
6.4.1 Performance Evaluation: SBN Versus Move FURISC 105
6.5 FURISC Applied to Realize Encrypted Programs 106
6.6 Results 110
6.6.1 Drawback of FURISc 111
6.7 FHE Processor Implementation Challenges 112
6.8 Utilizing Compression Technique for FHE Architecture 113
6.8.1 Run Length Encoding 113
6.8.2 Proposed Encoding Module 113
6.8.3 Different Choices of Subsequence Length to Store in RAM 117
6.9 Conclusion 118
References 119
7 Conclusion and Future Work 121
References 122
A Lattice Based Cryptography 123
B LWE Based FHE 126
B.1 Basics of LWE Based Cryptosystem 126
B.2 Important LWE Based FHE Schemes 127
C GSW Based FHE Approach 129
C.1 Brief Details of Scheme Supporting Bit-Wise Homomorphy 130
D FHE Based Libraries in Literature 132
E Attacks on SWHE and FHE 135
E.1 Passive Attacks Against HE 135
E.2 Active Attacks Against HE 136
F Examples of Homomorphic Real World Applications 138
Bibliography 140
备用描述
Clouds are being positioned as the next-generation consolidated, centralized, yet federated IT infrastructure for hosting all kinds of IT platforms and for deploying, maintaining, and managing a wider variety of personal, as well as professional applications and services. Handbook of Research on Cloud Infrastructures for Big Data Analytics focuses exclusively on the topic of cloud-sponsored big data analytics for creating flexible and futuristic organizations. This book helps researchers and practitioners, as well as business entrepreneurs, to make informed decisions and consider appropriate action to simplify and streamline the arduous journey towards smarter enterprises.
备用描述
Front Matter ....Pages i-vii
Introduction (Ayantika Chatterjee, Khin Mi Mi Aung)....Pages 1-7
Literature Survey (Ayantika Chatterjee, Khin Mi Mi Aung)....Pages 9-21
Sorting on Encrypted Data (Ayantika Chatterjee, Khin Mi Mi Aung)....Pages 23-47
Translating Algorithms to Handle Fully Homomorphic Encrypted Data (Ayantika Chatterjee, Khin Mi Mi Aung)....Pages 49-70
Secure Database Handling (Ayantika Chatterjee, Khin Mi Mi Aung)....Pages 71-86
FURISC: FHE Encrypted URISC Design (Ayantika Chatterjee, Khin Mi Mi Aung)....Pages 87-115
Conclusion and Future Work (Ayantika Chatterjee, Khin Mi Mi Aung)....Pages 117-118
Back Matter ....Pages 119-141
备用描述
"This book focuses exclusively on the topic of cloud-sponsored big data analytics for creating flexible and futuristic organizations, helping make informed decisions and consider appropriate action to simplify and streamline the arduous journey towards smarter enterprises"-- Provided by publisher
开源日期
2019-04-01
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。