Home → Magazine Archive → March 2010 (Vol. 53, No. 3) → Computing Arbitrary Functions of Encrypted Data → Abstract

Computing Arbitrary Functions of Encrypted Data

By Craig Gentry

Communications of the ACM, Vol. 53 No. 3, Pages 97-105
10.1145/1666420.1666444

[article image]


Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a worker that does not have the secret decryption key to compute any (still encrypted) result of the data, even when the function of the data is very complex.

The full text of this article is premium content

0 Comments

No entries found