• DocumentCode
    568440
  • Title

    How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation

  • Author

    Brenner, Michael ; Perl, Henning ; Smith, Matthew

  • Author_Institution
    Distrib. Comput. Security Group, Leibniz Univ. Hannover, Hannover, Germany
  • fYear
    2012
  • fDate
    25-27 June 2012
  • Firstpage
    375
  • Lastpage
    382
  • Abstract
    Homomorphic cryptography has received a lot of attention due to potentially ground breaking advances in cryptography. However it is also surrounded by a lot of hyperbole such as "ground breaking advances", "this will solve all Cloud computing problems" to "it is completely impractical" and "it will never work for real world problems". In previous work we showed how homomorphic encryption can be used to execute arbitrary programs in encrypted space, showing that at least in theory real world problems can be computed protected by homomorphic cryptography without losing generality. In this paper we expand our work to evaluate how practical current homomorphic cryptography based on the Smart-Vercauteren system is for executing arbitrary programs on untrusted resources. For this we present the implementation of a method to compute non-linear secret programs on an untrusted resource using encrypted circuits embedded in an encrypted virtual machine. We successively show how a processor architecture using encrypted circuits can be implemented so it can support read and write memory access, dynamic parameters and non-linear programs that render branch-decisions at runtime. The system comprises the runtime environment for program execution and an assembler to generate the encrypted machine code. We present performance evaluation of the sub-components as well as the complete system. The system represents a flexible prototype for homomorphic program execution in software and system architecture.
  • Keywords
    cloud computing; cryptography; resource allocation; software architecture; software performance evaluation; virtual machines; arbitrary programs execution; branch-decisions rendering; cloud computing problems; dynamic parameters; encrypted circuits; encrypted machine code; encrypted virtual machine; ground breaking advances; homomorphic cryptography; homomorphical encrypted program execution; nonlinear programs; nonlinear secret programs; processor architecture; program execution; read-write memory access; real world problems; runtime environment; smart-vercauteren system; software architecture; untrusted resource; Encryption; Integrated circuit modeling; Logic gates; Polynomials; Registers; encrypted circuits; homomorphic encryption; secret program execution; secure function evaluation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
  • Conference_Location
    Liverpool
  • Print_ISBN
    978-1-4673-2172-3
  • Type

    conf

  • DOI
    10.1109/TrustCom.2012.174
  • Filename
    6295998