|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Homomorphic Encryption from Ring Learning with Errors
If you have a question about this talk, please contact Microsoft Research Cambridge Talks Admins.
This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending
The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns that can be satisfactorily addressed if users encrypt the data they send to the cloud. If the encryption scheme is homomorphic, the cloud can still perform meaningful computations on the data, even though it is encrypted. In fact, we now know a number of constructions of fully homomorphic encryption schemes that allow arbitrary computation on encrypted data. In the last two years, solutions for fully homomorphic encryption have been proposed and improved upon, but all currently available options seem to be too inefficient to be used in practice. However, for many applications it is sufficient to implement somewhat homomorphic encryption schemes, which support a limited number of homomorphic operations. They can be much faster, and more compact than fully homomorphic schemes.
This talk will focus on describing the recent somewhat homomor- phic encryption scheme of Brakerski and Vaikuntanathan, whose security relies on the ring learning with errors (RLWE) problem.
This talk is part of the Microsoft Research Cambridge, public talks series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsCambridge Statistics Initiative (CSI) OpenCoffee Cambridge Religion, Conflict and its Aftermath
Other talksOpen Innovation Workshop: Framework & Strategy for Your Innovation Process From C to Proton Sea: Bjorken-x Dependence of the Parton Distribution Functions Molecular characterization of the Flagellar Pocket Collar cytoskeletal of the protozoan parasite Trypanosoma brucei Ritual, Community, and Conflict Fox's son, they slept five, imitation of people: Kuikuro numerals and counting A new relaxation of differential privacy - A part of Women in Data Science (WiDS)