• DocumentCode
    434543
  • Title

    Securely utilizing external computing power

  • Author

    Yu, Yu ; Leiwo, Jussipekka ; Premkumar, Benjamin

  • Author_Institution
    Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore
  • Volume
    1
  • fYear
    2005
  • fDate
    4-6 April 2005
  • Firstpage
    762
  • Abstract
    Suppose a weak power device Alice (e.g. a smart card) has some private program p. When carried outside, she may capture some private data x and want to compute p(x) but lacks the resources to do it. This paper presents a solution that allows a semi-honest Bob to execute the program in such an oblivious way that both x and p are computationally hidden and p(x) is disclosed to Bob only if Alice so wishes. We describe a procedure of encrypting a general program as well as explore the information hiding properties. Our solution is generic for most deterministic polynomial-time programs and it provides a programming interface for Alice, a compiler for Carol and a circuit evaluator program for Bob.
  • Keywords
    cryptography; data encapsulation; circuit evaluator program; polynomial-time program; private data; program encryption; programming interface; smart card; Biometrics; Circuits; Cryptography; Fingerprint recognition; Polynomials; Power engineering and energy; Power engineering computing; Privacy; Smart cards; Workstations;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on
  • Print_ISBN
    0-7695-2315-3
  • Type

    conf

  • DOI
    10.1109/ITCC.2005.253
  • Filename
    1428556