Abstract
We analyze the possibility of implementation of cloud computing over private data that is based on previously proposed threshold fully homomorphic cryptosystems. The main result is a protocol for securer cloud computing over private data in a model with supplementary cryptoservers. As a result, one gets a system that does not require a public key and replaces a sophisticated and costly bootstrapping by a more efficient reencryption protocol run by the cryptoservers.
Similar content being viewed by others
References
Varnovskii, N.P., Martishin, S.A., Khrapchenko, M.V., and Shokurov, A.V., Threshold cryptography methods to secure cloud computing, Tr. Inst. Sistemnogo Program. Ross. Akad. Nauk, 2014, vol. 26, no. 2., pp. 269–274.
Asharov, G., Jain, A., Lopez-Alt, A., Tromer, E., Vaikuntanathan, V., and Wichs, D., Multiparty computation with low communication, computation and interaction via threshold fhe, Advances in Cryptology (Proc. of EUROCRYPT 2012), Berlin: Springer, 2012, pp. 483–501.
Varnovskii, N.P., Zakharov, V.A., and Shokurov, A.V., On the existence of provably secure cloud computing systems, Vestn. Mosk. Univ. (in press).
Myers, S., Sergi, M., and Shelat, A., Threshold fully homomorphic encryption and secure computation, In eprint 2011/454, 2011.
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V., Fully homomorphic encryption over the integers, Lect. Notes Comput. Sci., 2010, vol. 6110, pp. 24–43.
van Dijk, M. and Juels, A., On the impossibility of cryptography alone for privacy-preserving cloud computing, in Hot topics in Security (HotSec’10), USENIX Association, 2010, pp. 1–8.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © N.P. Varnovskiy, S.A. Martishin, M.V. Khrapchenko, A.V. Shokurov, 2015, published in Programmirovanie, 2015, Vol. 41, No. 4.
Rights and permissions
About this article
Cite this article
Varnovskiy, N.P., Martishin, S.A., Khrapchenko, M.V. et al. Secure cloud computing based on threshold homomorphic encryption. Program Comput Soft 41, 215–218 (2015). https://doi.org/10.1134/S0361768815040088
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1134/S0361768815040088