Computing with data privacy: Steps toward realization

David W. Archer, Kurt Rohloff

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

Two new cryptographic methods - linear secret sharing (LSS) and fully homomorphic encryption (FHE) - allow computing on sensitive data without decrypting it. LSS and FHE differ in speed, ease of use, computational primitives, and cost.

Original languageEnglish (US)
Article number7031819
Pages (from-to)22-29
Number of pages8
JournalIEEE Security and Privacy
Volume13
Issue number1
DOIs
StatePublished - Jan 1 2015

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Keywords

  • FHE
  • LSS
  • cryptography
  • homomorphic encryption
  • linear secret sharing
  • privacy
  • secure multiparty computation

Fingerprint Dive into the research topics of 'Computing with data privacy: Steps toward realization'. Together they form a unique fingerprint.

Cite this