Paper
29 May 2013 Evaluating encrypted Boolean functions on encrypted bits: secure decision-making on the black side
Rajesh Krishnan, Ravi Sundaram
Author Affiliations +
Abstract
We present a novel approach for secure evaluation of encrypted Boolean functions on encrypted bits. Building upon Barrington’s work to transform circuits to group programs and the Feige-Kilian-Naor cryptographic protocol, our novel Fixed Structure Group Program construction for secure evaluation eliminates the need for an expensive Universal Circuit to hide the function. Elements on the Black side weave together and multiply two coordinated streams of random sequences of elements from an unsolvable group; the Boolean decision is recovered while preserving the confidentiality of the decision function and the input bits. The operation is fast and can be further sped up using parallel computation. Our approach can handle expressions with NC1 complexity, which is the class of Acyclic Boolean Circuits with polynomial width and logarithmic depth in the size of the input. This efficiently parallelizable class includes nonmonotone Boolean expressions of equality, inequality/range, Hamming distance, Boolean matrix multiplication, and kof- m threshold matching operations. The combined benefits of scaling and expressivity of our approach enables secure decision-making on the Black side. Envisioned applications include confidential publish/subscribe systems (with empirically validated performance), secure content-oriented internetworks, confidential forwarding and firewalling rules, and cross-domain guards.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rajesh Krishnan and Ravi Sundaram "Evaluating encrypted Boolean functions on encrypted bits: secure decision-making on the black side", Proc. SPIE 8754, Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013, 875409 (29 May 2013); https://doi.org/10.1117/12.2018574
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Chemical elements

Device simulation

Clouds

Computer programming

Java

Information security

Matrix multiplication

RELATED CONTENT

A method for traveling salesman problem by use of pattern...
Proceedings of SPIE (September 01 2009)
FPGA implementation of image component labeling
Proceedings of SPIE (August 26 1999)
Writing on wet paper
Proceedings of SPIE (March 21 2005)

Back to Top