Affiliation:
1. IBM T.J. Watson Research Center, Hawthorne, NY
Abstract
Suppose that you want to delegate the ability to
process
your data, without giving away
access
to it. We show that this separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a worker that
does not have the secret decryption key
to compute any (still encrypted) result of the data, even when the function of the data is very complex. In short, a third party can perform complicated processing of data without being able to see it. Among other things, this helps make cloud computing compatible with privacy.
Publisher
Association for Computing Machinery (ACM)
Cited by
349 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献