Fully Homomorphic Encryption in Real World Applications (Computer Architecture and Design Methodologies)
by:Ayantika Chatterjee and Khin Mi Mi Aung
Publisher Finelybook 出版社：Springer; 1st ed. 2019 edition (August 14, 2020)
pages 页数：152 pages
From the Back Cover
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book begins by:addressing perennial problems like sorting and searching through FHE data, followed by:a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.
About the Author
Ayantika Chatterjee is currently working as Assistant Professor of Indian Institute of Technology, Kharagpur, India. Previously, she was working as a Research Scientist for Data Center Technologies (DCT) at the Data Storage Institute (DSI), part of the Agency for Science, Technology and Research (A*STAR), Singapore. She received her PhD from Department of Computer Science and Engineering, Indian Institute of Technology (IIT) in Kharagpur, India, and published in different peer-reviewed conferences and journals. Her research interests include encrypted computation, security of cloud, cyber-physical systems and their respective VLSI implementations.
Khin Mi Mi Aung received her PhD in Computer Engineering from Korea Aerospace University in 2006. She is currently working as a scientist with A*STAR, Data Storage Institute, Singapore. Her research interests include data and information security, data centers, and network storage technologies. She has published on data security in numerous international journals and conference proceedings.