Fully Homomorphic Encryption in Real World Applications -  Khin Mi Mi Aung,  Ayantika Chatterjee

Fully Homomorphic Encryption in Real World Applications (eBook)

eBook Download: PDF
2019 | 1. Auflage
VII, 141 Seiten
Springer Singapore (Verlag)
978-981-13-6393-1 (ISBN)
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.


Ayantika Chatterjee is currently working as a Research Scientist for Data Center Technologies (DCT) at the Data Storage Institute (DSI), part of the Agency for Science, Technology and Research (A*STAR), Singapore. She received her BTech degree from the WBUT, India, her MSc degree from the Department of Computer Science and Engineering, Indian Institute of Technology (IIT) in Kharagpur, India, and her PhD from the School of Information Technology, IIT Kharagpur, India. Her research interests include cryptography and VLSI design.
 
Khin Mi Mi Aung received her PhD in Computer Engineering from Korea Aerospace University in 2006. She is currently working as a scientist with A*STAR, Data Storage Institute, Singapore. Her research interests include data and information security, data centers, and network storage technologies. She has published on data security in numerous international journals and conference proceedings.

This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.

Ayantika Chatterjee is currently working as a Research Scientist for Data Center Technologies (DCT) at the Data Storage Institute (DSI), part of the Agency for Science, Technology and Research (A*STAR), Singapore. She received her BTech degree from the WBUT, India, her MSc degree from the Department of Computer Science and Engineering, Indian Institute of Technology (IIT) in Kharagpur, India, and her PhD from the School of Information Technology, IIT Kharagpur, India. Her research interests include cryptography and VLSI design. Khin Mi Mi Aung received her PhD in Computer Engineering from Korea Aerospace University in 2006. She is currently working as a scientist with A*STAR, Data Storage Institute, Singapore. Her research interests include data and information security, data centers, and network storage technologies. She has published on data security in numerous international journals and conference proceedings.

Introduction.- Mathematical Background.- Searching and Sorting on Encrypted Data.- Translating Algorithms to Handle Fully Homomorphic Encrypted Data.- Secure Database Handling.- Encrypted Processor Design.- Conclusion.

Erscheint lt. Verlag 29.3.2019
Reihe/Serie Computer Architecture and Design Methodologies
Zusatzinfo VII, 141 p. 40 illus., 6 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Technik Elektrotechnik / Energietechnik
Schlagworte Cloud Security • Encrypted Algorithm • encrypted computing • Encrypted Database Design • Encrypted Processor Architecture • Encrypted Processor Design • FHE ultra reduced instruction set computer (FURISC) • Fully Homomorphic Encryption (FHE) • lattice theory • Secure Database Handling
ISBN-10 981-13-6393-5 / 9811363935
ISBN-13 978-981-13-6393-1 / 9789811363931
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 3,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99