Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Fully Homomorphic Encryption in Real World ApplicationsFURISC: FHE Encrypted URISC Design

Fully Homomorphic Encryption in Real World Applications: FURISC: FHE Encrypted URISC Design [As stated by Gosser, “ Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, and the designer tries to close them”. Hence, for any secure program execution, the instruction flow should also be encrypted. However, finding suitable solution to determine the termination point of any encrypted program is still an open challenge. Encrypted termination requires handling of encrypted condition, which is infeasible by existing unencrypted processors. Thus, for outsourcing computations and achieving privacy, designs of processors which operate on encrypted data as well as address are extremely important. This chapter provides some insight on this issue.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Fully Homomorphic Encryption in Real World ApplicationsFURISC: FHE Encrypted URISC Design

Loading next page...
 
/lp/springer-journals/fully-homomorphic-encryption-in-real-world-applications-furisc-fhe-8EcsVojX2e
Publisher
Springer Singapore
Copyright
© Springer Nature Singapore Pte Ltd. 2019
ISBN
978-981-13-6392-4
Pages
87 –115
DOI
10.1007/978-981-13-6393-1_6
Publisher site
See Chapter on Publisher Site

Abstract

[As stated by Gosser, “ Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, and the designer tries to close them”. Hence, for any secure program execution, the instruction flow should also be encrypted. However, finding suitable solution to determine the termination point of any encrypted program is still an open challenge. Encrypted termination requires handling of encrypted condition, which is infeasible by existing unencrypted processors. Thus, for outsourcing computations and achieving privacy, designs of processors which operate on encrypted data as well as address are extremely important. This chapter provides some insight on this issue.]

Published: Mar 30, 2019

There are no references for this article.