DocumentCode :
434543
Title :
Securely utilizing external computing power
Author :
Yu, Yu ; Leiwo, Jussipekka ; Premkumar, Benjamin
Author_Institution :
Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore
Volume :
1
fYear :
2005
fDate :
4-6 April 2005
Firstpage :
762
Abstract :
Suppose a weak power device Alice (e.g. a smart card) has some private program p. When carried outside, she may capture some private data x and want to compute p(x) but lacks the resources to do it. This paper presents a solution that allows a semi-honest Bob to execute the program in such an oblivious way that both x and p are computationally hidden and p(x) is disclosed to Bob only if Alice so wishes. We describe a procedure of encrypting a general program as well as explore the information hiding properties. Our solution is generic for most deterministic polynomial-time programs and it provides a programming interface for Alice, a compiler for Carol and a circuit evaluator program for Bob.
Keywords :
cryptography; data encapsulation; circuit evaluator program; polynomial-time program; private data; program encryption; programming interface; smart card; Biometrics; Circuits; Cryptography; Fingerprint recognition; Polynomials; Power engineering and energy; Power engineering computing; Privacy; Smart cards; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on
Print_ISBN :
0-7695-2315-3
Type :
conf
DOI :
10.1109/ITCC.2005.253
Filename :
1428556
Link To Document :
بازگشت