Cryptographic Techniques for Data Processing

Document Type

Conference Proceeding

Publication Date

1-8-2022

Abstract

This tutorial focuses on two principal lines of research aimed to provide secure data processing cloud-based data outsourcing - encryption and secret-sharing-based approaches that have been developed over the last two decades. The tutorial compares these techniques based on efficiency and information leakage. We discuss that existing cryptographic techniques are not sufficient alone to achieve the goal of efficient as well as secure data processing. To overcome the limitation of efficient and secure data processing, a new line of work that combines software and hardware mechanisms is required. We discuss an orthogonal approach designed around the concept of data partitioning, i.e., splitting the data processing into cryptographically secure and non-secure parts. Finally, we will discuss some open questions in designing secure cryptographic techniques that can process large-sized data efficiently.

Identifier

85122702001 (Scopus)

ISBN

[9781450385824]

Publication Title

ACM International Conference Proceeding Series

External Full Text Location

https://doi.org/10.1145/3493700.3493771

First Page

344

Last Page

347

This document is currently not available here.

Share

COinS