The current solutions for secure processing in the encrypted domain are usually based on homomorphic cryptosystems operating on very large algebraic structures. Recently, a composite signal representation has been proposed that allows to speed up linear operations on encrypted signals via parallel processing and to reduce the size of the encrypted signals. Though many of the most common signal processing operations can be applied to composite signals, some operations require to process the signal samples independently from each other, thus requiring an unpacking of the composite signals. In this paper, we will address the above issues, showing both merits and limits of the composite signal representation when applied in practical scenarios. A secure protocol for converting an encrypted composite representation into the encryptions of the single signal samples will be introduced. A case study clearly highlights pros and cons of using the composite signal representation in the proposed scenarios.

Processing in the Encrypted Domain using a Composite Signal Representation: Pros and Cons / T. Bianchi; P.J.M. (Thijs) Veugen; A. Piva; M. Barni. - STAMPA. - (2009), pp. 176-180. (Intervento presentato al convegno First IEEE Workshop on Information Forensics and Security (WIFS09) tenutosi a London, United Kingdom nel December 6-9, 2009).

Processing in the Encrypted Domain using a Composite Signal Representation: Pros and Cons

PIVA, ALESSANDRO;
2009

Abstract

The current solutions for secure processing in the encrypted domain are usually based on homomorphic cryptosystems operating on very large algebraic structures. Recently, a composite signal representation has been proposed that allows to speed up linear operations on encrypted signals via parallel processing and to reduce the size of the encrypted signals. Though many of the most common signal processing operations can be applied to composite signals, some operations require to process the signal samples independently from each other, thus requiring an unpacking of the composite signals. In this paper, we will address the above issues, showing both merits and limits of the composite signal representation when applied in practical scenarios. A secure protocol for converting an encrypted composite representation into the encryptions of the single signal samples will be introduced. A case study clearly highlights pros and cons of using the composite signal representation in the proposed scenarios.
2009
Proceedings of First IEEE Workshop on Information Forensics and Security (WIFS09)
First IEEE Workshop on Information Forensics and Security (WIFS09)
London, United Kingdom
December 6-9, 2009
T. Bianchi; P.J.M. (Thijs) Veugen; A. Piva; M. Barni
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/384720
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 11
  • ???jsp.display-item.citation.isi??? ND
social impact