homomorphic encryption
play

Homomorphic Encryption Prepared by: Walid A. Hanafy Under - PowerPoint PPT Presentation

Homomorphic Encryption Prepared by: Walid A. Hanafy Under supervision of Professor Mohamed E. Mahmoud Cryptographic Goals The Goal is to allow the computations on the encrypted data. i.e. E


  1. Homomorphic Encryption Prepared by: Walid A. Hanafy Under supervision of Professor Mohamed E. Mahmoud

  2. Cryptographic Goals • The Goal is to allow the computations on the encrypted data. • i.e. E 𝑛 � ⊙ 𝑛 � � 𝐹 𝑛 � ⊙ 𝐹�𝑛 � � • Homomorphic Encryption is classified into 3 categories: • Partially Homomorphic: (Only one operation, for unlimited number of executions) • Somewhat Homomorphic: (Multiple operations for a limited number of executions) 2 • Fully Homomorphic: (Multiple operations for an unlimited number of executions)

  3. Partially Homomorphic • Multiplicatively Homomorphic • RSA • El Gamal • Additively Homomorphic • Paillier* * The Paillier Cryptosystem can execute multiplication if only 𝑛 � is encrypted 3

  4. Properties of Paillier Crypto • Depends on hardness of Factorization Problem and The composite residuosity problem. • Encrypted messages are unlinkable 4

  5. Applications • Computation offloading • Secure Data Aggregation: • Smart Metering Infrastructure privacy preservation • E‐Voting 5

  6. How It Works 6

  7. Correctness Proof of Paillier Cryptosystem 7

  8. Preliminaries(1/4): 8

  9. Preliminaries(2/4): 9

  10. Preliminaries(3/4): 10

  11. Preliminaries(4/4): 11

  12. Decryption Phase (1/2) 12

  13. Decryption Phase (2/2) 13

  14. Homomorphism Properties 14

  15. Paper under review • In this paper the homomorphic is applied in three methods: • Spatial Aggregation • Temporal Aggregation • Spatio‐Temporal Aggregation • However, this paper added to the basic HM scheme a threshold condition (Threshold Decryption) 15

  16. Aggregating Spatial Reading (1/2) • For a set of smart meters 𝑡𝑛 � 𝑡𝑛 � , 𝑡𝑛 � , . . , 𝑡𝑛 � , For every interval 𝑞 each meter generates n‐1 random numbers, then each sm computes the following • Then for encryption: where h is the hashed version of 𝑞 . 16

  17. Aggregating Spatial Reading (2/2) • Aggregation: • Given that: 17

  18. Aggregating Temporal Reading • Random Number generation: • Coping with Malfunctions using a third party: 18

  19. Spatio‐Temporal 19

  20. Performance Analysis of Three schemes • Note this scheme is collusion safe as long as colluding parties is less than N‐2. 20

Recommend


More recommend