Skip to main content
Log in

Secure cloud computing based on threshold homomorphic encryption

  • Published:
Programming and Computer Software Aims and scope Submit manuscript

Abstract

We analyze the possibility of implementation of cloud computing over private data that is based on previously proposed threshold fully homomorphic cryptosystems. The main result is a protocol for securer cloud computing over private data in a model with supplementary cryptoservers. As a result, one gets a system that does not require a public key and replaces a sophisticated and costly bootstrapping by a more efficient reencryption protocol run by the cryptoservers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Varnovskii, N.P., Martishin, S.A., Khrapchenko, M.V., and Shokurov, A.V., Threshold cryptography methods to secure cloud computing, Tr. Inst. Sistemnogo Program. Ross. Akad. Nauk, 2014, vol. 26, no. 2., pp. 269–274.

    Google Scholar 

  2. Asharov, G., Jain, A., Lopez-Alt, A., Tromer, E., Vaikuntanathan, V., and Wichs, D., Multiparty computation with low communication, computation and interaction via threshold fhe, Advances in Cryptology (Proc. of EUROCRYPT 2012), Berlin: Springer, 2012, pp. 483–501.

    Google Scholar 

  3. Varnovskii, N.P., Zakharov, V.A., and Shokurov, A.V., On the existence of provably secure cloud computing systems, Vestn. Mosk. Univ. (in press).

  4. Myers, S., Sergi, M., and Shelat, A., Threshold fully homomorphic encryption and secure computation, In eprint 2011/454, 2011.

    Google Scholar 

  5. van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V., Fully homomorphic encryption over the integers, Lect. Notes Comput. Sci., 2010, vol. 6110, pp. 24–43.

    Article  Google Scholar 

  6. van Dijk, M. and Juels, A., On the impossibility of cryptography alone for privacy-preserving cloud computing, in Hot topics in Security (HotSec’10), USENIX Association, 2010, pp. 1–8.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. P. Varnovskiy.

Additional information

Original Russian Text © N.P. Varnovskiy, S.A. Martishin, M.V. Khrapchenko, A.V. Shokurov, 2015, published in Programmirovanie, 2015, Vol. 41, No. 4.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Varnovskiy, N.P., Martishin, S.A., Khrapchenko, M.V. et al. Secure cloud computing based on threshold homomorphic encryption. Program Comput Soft 41, 215–218 (2015). https://doi.org/10.1134/S0361768815040088

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0361768815040088

Keywords

Navigation