Share Email Print
cover

Proceedings Paper

Provably secure data hiding and tamper resistance for a simple loop program
Author(s): Rida A Bazzi; K. Slecuk Candan; Raphael Badin; Aziz Fajri
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

We study the problem of computing with encrypted data. We propose a hiding scheme that allows a client to execute a simple loop program with real or complex inputs securely on a server. This is the first hiding scheme that we are aware of that applies to real and complex data. The scheme allows the client to efficiently determine with high probability whether the results returned by the server are correct. The scheme we propose uses new techniques that have not been used previously in this context.

Paper Details

Date Published: 22 September 2003
PDF: 11 pages
Proc. SPIE 5071, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, (22 September 2003); doi: 10.1117/12.486836
Show Author Affiliations
Rida A Bazzi, Arizona State Univ. (United States)
K. Slecuk Candan, Arizona State Univ. (United States)
Raphael Badin, Arizona State Univ. (United States)
Aziz Fajri, Arizona State Univ. (United States)


Published in SPIE Proceedings Vol. 5071:
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II
Edward M. Carapezza, Editor(s)

© SPIE. Terms of Use
Back to Top