The current solutions for secure processing in the encrypted domain are usually based on homomorphic cryptosystems operating on very large algebraic structures. Recently, a composite signal representation has been proposed that allows to speed up linear operations on encrypted signals via parallel processing and to reduce the size of the encrypted signals. Though many of the most common signal processing operations can be applied to composite signals, some operations require to process the signal samples independently from each other, thus requiring an unpacking of the composite signals. In this paper, we will address the above issues, showing both merits and limits of the composite signal representation when applied in practical scenarios. A secure protocol for converting an encrypted composite representation into the encryptions of the single signal samples will be introduced. A case study clearly highlights pros and cons of using the composite signal representation in the proposed scenarios.
Processing in the Encrypted Domain using a Composite Signal Representation: Pros and Cons / T. Bianchi; P.J.M. (Thijs) Veugen; A. Piva; M. Barni. - STAMPA. - (2009), pp. 176-180. (Intervento presentato al convegno First IEEE Workshop on Information Forensics and Security (WIFS09) tenutosi a London, United Kingdom nel December 6-9, 2009).
Processing in the Encrypted Domain using a Composite Signal Representation: Pros and Cons
PIVA, ALESSANDRO;
2009
Abstract
The current solutions for secure processing in the encrypted domain are usually based on homomorphic cryptosystems operating on very large algebraic structures. Recently, a composite signal representation has been proposed that allows to speed up linear operations on encrypted signals via parallel processing and to reduce the size of the encrypted signals. Though many of the most common signal processing operations can be applied to composite signals, some operations require to process the signal samples independently from each other, thus requiring an unpacking of the composite signals. In this paper, we will address the above issues, showing both merits and limits of the composite signal representation when applied in practical scenarios. A secure protocol for converting an encrypted composite representation into the encryptions of the single signal samples will be introduced. A case study clearly highlights pros and cons of using the composite signal representation in the proposed scenarios.I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.