Achieving trustworthy homomorphic encryption by combining it with a trusted execution environment

Nir Drucker, Shay Gueron

Research output: Contribution to journalArticlepeer-review

Abstract

Cloud database services become very appealing solutions. They offer performance and storage capabilities that client platforms do not have. However, in order to protect the users’ confidentiality and to ensure the integrity of their computations, solutions often use one of three approaches: a) Encrypting the data prior to uploading it with some symmetric encryption; b) Using a Trusted Execution Environments (TEE) such as OS containers, Virtual Machines or Intel’s Software Guard Extension (SGX); c) using Homomorphic Encryption (HE) schemes. A newer approach, which we call the”combined model” uses a TEE to guarantee the integrity and correctness of the database code and data, while the data itself is encrypted with some HE scheme. In this paper, we explain the combined model and we show how to use it in the context of modern Multi Party Computations (MPC) schemes. In addition, we demonstrate how to construct a voting system that leverages its capabilities.

Original languageEnglish
Pages (from-to)86-99
Number of pages14
JournalJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Volume9
Issue number1
DOIs
StatePublished - Mar 2018

Bibliographical note

Funding Information:
This research was supported by the Israel Science Foundation (grant No. 1018/16), the BIU Center for Research in Applied Cryptography and Cyber Security, in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office, and the Center for Cyber Law and Policy at the University of Haifa.

Publisher Copyright:
© 2018, Innovative Information Science and Technology Research Group. All rights reserved.

Keywords

  • Cloud database
  • Homomorphic Encryption
  • Multi Party Computations
  • Paillier cryptosystem
  • Secure Guard Extension
  • Trusted Execution Environment

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Achieving trustworthy homomorphic encryption by combining it with a trusted execution environment'. Together they form a unique fingerprint.

Cite this