DocumentCode
1925101
Title
Policy-agile encrypted networks via secure function computation
Author
Krishnan, Rajesh ; Sundaram, Ravi
fYear
2010
fDate
Oct. 31 2010-Nov. 3 2010
Firstpage
954
Lastpage
959
Abstract
Recent developments in cryptography in the areas of secure multi-party function computation and homomorphic encryption enable new policy-agile encrypted networking capabilities. By applying algorithms that can securely perform encrypted operations on encrypted data without decryption of either, context- and content-aware decisions can be performed (or policy rules applied) within a new advanced “black core” network while preserving confidentiality of the mission context and content. We discuss three application areas-with applicability to defense, law enforcement, intelligence community, and commercial networks, especially when resource sharing and collaboration across multiple organizations must occur over out-sourced third party infrastructures-that are enabled.
Keywords
cryptography; data privacy; black core network; commercial network; confidentiality preservation; content-aware decision; context-aware decision; cryptography; homomorphic encryption; intelligence community; law enforcement; multiparty function computation security; policy-agile encrypted network; resource sharing; Complexity theory; Encryption; Internetworking; Protocols; Receivers; black core; content-oriented internetworking; content/context-awareness; policy-agility; secure multiparty computation;
fLanguage
English
Publisher
ieee
Conference_Titel
MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010
Conference_Location
San Jose, CA
ISSN
2155-7578
Print_ISBN
978-1-4244-8178-1
Type
conf
DOI
10.1109/MILCOM.2010.5679583
Filename
5679583
Link To Document