基於全同態加密的可驗證外包計算研究
No Thumbnail Available
Date
2025
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
全同態加密技術在隱私保護領域中占有關鍵地位,尤其是在雲端運算或運算外包等場景中。該技術允許使用者在加密資料上進行所需的計算。然而,由於所有計算都是在加密狀態下完成的,資料提供者在不解密計算過程的情況下,難以驗證運算方是否對計算結果進行了篡改。雖然已有一些研究者針對此問題提出了解決方案,但這些方法通常會導致客戶端在初始化或驗證階段耗費過多的運算資源與時間,而且某些方法可能並不具備通用性。因此,我們設計了一種可驗證的全同態加密機制,以確保資料提供者能夠輕鬆驗證運算方是否對計算過程進行了篡改。此外,該機制亦旨在盡可能降低資料提供者的運算負擔。
Fully Homomorphic encryption technology holds a pivotal position in the field of privacy protection, especially in scenarios such as cloud computing or computational outsourcing. This technology allows users to perform necessary computations on encrypted data. However, since all computations are performed under encryption, data providers find it challenging to verify whether the computing party has tampered with the computation results without decrypting the process. Although some researchers have already designed solutions for this problem, these methods usually cause the client to consume excessive computational resources and time during the setup or verification phase, and there is also the possibility that some methods may not be universally applicable. Therefore, we design a verifiable fully homomorphic encryption mechanism to ensure that data providers can easily verify whether the computing party has tampered with the computation process. Furthermore, it aims to minimize the computational load on the data provider as much as possible.
Fully Homomorphic encryption technology holds a pivotal position in the field of privacy protection, especially in scenarios such as cloud computing or computational outsourcing. This technology allows users to perform necessary computations on encrypted data. However, since all computations are performed under encryption, data providers find it challenging to verify whether the computing party has tampered with the computation results without decrypting the process. Although some researchers have already designed solutions for this problem, these methods usually cause the client to consume excessive computational resources and time during the setup or verification phase, and there is also the possibility that some methods may not be universally applicable. Therefore, we design a verifiable fully homomorphic encryption mechanism to ensure that data providers can easily verify whether the computing party has tampered with the computation process. Furthermore, it aims to minimize the computational load on the data provider as much as possible.
Description
Keywords
全同態加密, 可驗證外包計算, Fully Homomorphic Encryption, Verifiable Outsourcing Computation