Shai Halevi discusses new ways to protect cloud data and security. Presented at "New Techniques for Protecting Cloud Data and Security" organized by the New York Technology Council.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
Introduction to homomorphic encryption, encryption which allows computations on ciphertext. An overview of key aspects and the ideas that allow these schemes to work is given, as well as examples of how to apply it.
Christoph Matthies (@chrisma0), Hubert Hesse (@hubx), Robert Lehmann (@rlehmann)
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
Information And Data Security Block Cipher and the data encryption standard (DES) seminar
Mustansiriya University
Department of Education
Computer Science
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
Learn what is Asymmetric Encryption and how asymmetric encryption works with examples. Also, demystify the difference between asymmetric vs symmetric encryption.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Elliptic Curve Cryptography and the basis of elliptic curve arithmetics.
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
Overview on Cryptography and Network SecurityDr. Rupa Ch
These slides give some overview on the the concepts which were in Crytography and network security. I have prepared these slides by the experiece after refer the text bbok as well as resources from the net. Added figures directly from the references. I would like to acknowledge all the authors by originally.
Introduction to homomorphic encryption, encryption which allows computations on ciphertext. An overview of key aspects and the ideas that allow these schemes to work is given, as well as examples of how to apply it.
Christoph Matthies (@chrisma0), Hubert Hesse (@hubx), Robert Lehmann (@rlehmann)
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
Information And Data Security Block Cipher and the data encryption standard (DES) seminar
Mustansiriya University
Department of Education
Computer Science
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
Learn what is Asymmetric Encryption and how asymmetric encryption works with examples. Also, demystify the difference between asymmetric vs symmetric encryption.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Elliptic Curve Cryptography and the basis of elliptic curve arithmetics.
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
Overview on Cryptography and Network SecurityDr. Rupa Ch
These slides give some overview on the the concepts which were in Crytography and network security. I have prepared these slides by the experiece after refer the text bbok as well as resources from the net. Added figures directly from the references. I would like to acknowledge all the authors by originally.
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)Tech in Asia ID
This slide was shared on Tech in Asia Jakarta 2016 @ 17 November 2016.
Get updates about our dev events delivered straight to your inbox by signing up here: http://bit.ly/tia-dev ! Be the first to know when new information is available!
Lecture on 18 December 2018
Role of Cryptography in Blockchain
RSA and SHA
Blockchain for Beginners
Elective course from the Faculty of Information Technology, Thai - Nichi Institute of Technology, Bangkok for undergraduate students.
#BlockchainTNI2018
Pysense: wireless sensor computing in Python?Davide Carboni
PySense aims at bringing wireless sensor (and "internet of things") macroprogramming to the audience of Python programmers. WSN macroprogramming is an emerging approach where the network is seen as a whole and the programmer focuses only on the application logic. The PySense runtime environment
partitions the code and transmits code snippets to the right nodes finding a balance between energy
consumption and computing performances.
Hosted by the New York Technology Council (www.nytech.org) on October 25 at Anchin.
Presented by:
-Paul Ellis, Paul Ellis Law Group
-Frode Jensen, Holland & Knight
-Glen Westerback, Frankfurt Kurnit Klein & Selz
What Can Brain Science Teach Us
About User Experience?
Presented by Marc Resnick from Bentley University on June 6, 2012 for the New York Technology Council. Event held at New York Institute of Technology.
How Quick Are We to Judge? A Case
Study of Trust and Web Site Design
Presented by William Albert from Bentley University on June 6, 2012 for the New York Technology Council. Event was held at New York Institute of Technology.
Presented by the New York Technology Council on June 26, 2012 at the New York Institute of Technology. Panelists included Paul Ellis (Paul Ellis Law Group), Corey Massella (Citrin Cooperman), Jack Early (Cherrystone Angels), and Don More (Signal Hill).
Presented on April 3, 2012 by Charlie Babcock, Editor-at-Large, InformationWeek at "Management Strategies for Cloud Computing." Event was held at the New York Institute of Technology and organized by the New York Technology Council (NYTECH).
www.nytech.org
Presented by Rob Tannen of the Bresslergroup and Charles Mauro of MauroNewMedia on February 29, 2012 at "Measuring Your User Experience Design." The event was held at the New York Institute of Technology and organized by the New York Technology Council (NYTECH). www.nytech.org
On Wednesday, March 14, 2012, the New York Technology Council and CompTIA, provided a joint "Federal Legislative Briefing" at EisnerAmper. Together they discussed technology opportunities related to public policies currently in progress in Washington, DC.
www.nytech.org
Presented on Wednesday, Feb. 22, 2012 at "Mobile Technology & Social Change" by Michelle Fanzo of Four Corners Consulting. Event was organized by the New York Technology Council and held at Microsoft. www.nytech.org
Presented on Wednesday, Feb. 22, 2012 at "Mobile Technology & Social Change" by Michelle Fanzo of Four Corners Consulting. Event was organized by the New York Technology Council and held at Microsoft. www.nytech.org
"The New Patent Law: What Should Management Do Now?" presented by Ted Sabety, Manny Schecter and Peter Schechter on February 1, 2012 at the CUNY Graduate Center. Event organized by the New York Technology Council.
BioDigital Systems makes it possible to explore the human body in 3D. Presented by co-founder Frank Sculli at NYTECH's "Cutting Edge Technology Showcase."
Ori Inbar, CEO and Co-Founder of Ogmento, discusses innovations in location based and augmented reality gaming. Presented at the "Cutting-Edge Technology Showcase" organized by the New York Technology Council.
Johan Schalkwyk, a principal engineer at Google, discusses "augmented humanity" through the use of a smartphone. Presented at the "Cutting-Edge Technology Showcase" organized by the New York Technology Council.
Peter Weijmarshausen, CEO of Shapeways, discusses how 3D printing is revolutionizing the custom-made products industry. Presented at the "Cutting-Edge Technology Showcase" organized by the New York Technology Council.
New York TechnoloDonn Morrill and Matthew Evans, Manager of Public Advocacy for CompTIA, discuss the goings-on in Washington and what is being done to help small and mid-sized technology companies survive this difficult economic climate.
New York Technology Council Executive Director Donn Morrill and Matthew Evans, Manager of Public Advocacy for CompTIA, discuss the goings-on in Washington and what is being done to help small and mid-sized technology companies survive this difficult economic climate.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. Computing on Encrypted Data
I want to delegate processing of my data,
without giving away access to it.
3. Computing on Encrypted Data
• Wouldn’t it be nice to be able to…
– Encrypt my data before sending to the cloud
– While still allowing the cloud to
search/sort/edit/… this data on my behalf
– Keeping the data in the cloud in encrypted form
• Without needing to ship it back and forth to be
decrypted
4. Computing on Encrypted Data
• Wouldn’t it be nice to be able to…
– Encrypt my queries to the cloud
– While still allowing the cloud to process them
– Cloud returns encrypted answers
• that I can decrypt
5. Outsourcing Computation Privately
“I want to delegate the computation to the cloud,
“I wantthe cloud the computation to the cloud”
but to delegate shouldn’t see my input”
Enc(x) f
Enc[f(x)]
Client Server/Cloud
(Input: x) (Function: f)
8. Privacy Homomorphisms
• Rivest-Adelman-Dertouzos 1978
Plaintext space P Ciphertext space C
x1 x2 ci Enc(xi) c1 c2
y Dec(d)
y d
Example: RSA_encrypt(e,N)(x) = xe mod N
• x1e x x2e = (x1 x x2) e mod N
“Somewhat Homomorphic”: can compute some
functions on encrypted data, but not all
9. “Fully Homomorphic” Encryption
• Encryption for which we can compute arbitrary
functions on the encrypted data
Enc(x) Eval f
Enc(f(x))
• Another example: private information retrieval
i Enc(i) A[1 … n]
Enc(A[i])
11. Step 1: Boolean Circuit for f
• Every function can be constructed from
Boolean AND, OR, NOT
– Think of building it from hardware gates
• For any two bits b1, b2 (both 0/1 values)
– NOT b1 = 1 – b1
– b1 AND b2 = b1 b2
– b1 OR b2 = b1+b2– b1 b2
• If we can do +, – , x, we can do everything
12. Step 2: Encryption Supporting ,
• Open Problem for over 30 years
• Gentry 2009: first plausible scheme
– Security relies on hard problems in integer lattices
• Several other schemes in last two years
Fully homomorphic encryption
is possible
14. Performance
• A little slow…
• First working implementation in mid-2010,
½ -hour to compute a single AND gate
– 13-14 orders of magnitude slowdown
vs. computing on non-encrypted data
• A faster “dumbed down” version
– Can only evaluate “very simple functions”
– About ½-second for an AND gate
15. Performance
• Underlying “somewhat homomorphic” scheme
• PK is 2 integers, SK is one integer
Dimension KeyGen Enc Dec / AND
(amortized)
2048 1.25 sec 60 millisec 23 millisec
Small
800,000-bit
integers
Medium
8192 10 sec 0.7 sec 0.12 sec
3,200,000-bit
integers
32768 95 sec 5.3 sec 0.6 sec
Large
13,000,000-bit
integers
16. Performance
• Fully homomorphic scheme
Dimension KeyGen PK size AND
2048 40 sec 70 MByte 31 sec
Small
800,000-bit
integers
Medium
8192 8 min 285 MByte 3 min
3,200,000-bit
integers
32768 2 hours 2.3 GByte 30 min
Large
13,000,000-bit
integers
17. Performance
• A little slow…
• Butler Lampson: “I don’t think we’ll see
anyone using Gentry’s solution in our
lifetimes *…+” – Forbes, Dec-19, 2011
18. New Stuff
• New techniques suggested during 2011
• Promise ~3 orders of magnitude improvement
vs. Gentry’s original scheme
– Implementations on the way
• Still very expensive, but maybe suitable for
some niche applications
• Computing “simple functions” using these
tools may be realistic
20. Things we can already use today
• Sometimes simple functions is all we need
– Statistics, simple keyword match, etc.
• Interactive solutions are sometime faster
– vs. the single round trip of Homomorphic Enc
• Great efficiency gains when settling for
weaker notions of secrecy
– “Order preserving encryption”
– MIT’s CryptDB (onion encryption)
23. Limitations of function-as-circuit
• Some performance optimizations are ruled out
• Example: Binary search
– log(n) steps to find element in an n-element array
– But circuit must be of size ~n
• Example: private information retrieval
– Non-encrypted access with one lookup
– But encrypted access must touch all entries
• Else you leak information (element is not in i’th entry)
• Only data-oblivious computation is possible
24. The [Gentry 2009] blueprint
Evaluate any function in four “easy” steps
• Step 1: Encryption from linear ECCs
– Additive homomorphism Error-Correcting Codes
• Step 2: ECC lives inside a ring
– Also multiplicative homomorphism
– But only for a few operations (low-degree poly’s)
• Step 3: Bootstrapping
– Few ops (but not too few) any number of ops
• Step 4: Everything else
– “Squashing” and other fun activities
25. Step 1: Encryption from Linear ECCs
• For “random looking” codes, hard to
distinguish close/far from code
• Many cryptosystems built on this hardness
– E.g., *McEliece’78, AD’97, GGH’97, R’03,…+
26. Step 1: Encryption from Linear ECCs
• KeyGen: choose a “random” Code
– Secret key: “good representation” of Code
• Allows correction of “large” errors
– Public key: “bad representation” of Code
• Can generate “random code-words”
• Hard to distinguish close/far from the code
• Enc(0): a word close to Code
• Enc(1): a random word
– Far from Code (with high probability)
27. Example: Integers mod p [vDGHV 2010]
p N
• Code determined by a secret integer p
– Codewords: multiples of p
• Good representation: p itself
• Bad representation: ri << p
– N = pq, and also many xi = pqi + ri
• Enc(0): subset-sum(xi’s)+r mod N
– r is new noise, chosen by encryptor
• Enc(1): random integer mod N
28. A Different Input Encoding
p N
xi = pqi + ri
• Both Enc(0), Enc(1) close to the code
– Enc(0): distance to code is even Plaintext encoded
– Enc(1): distance to code is odd in the “noise”
– Security unaffected when p is odd
• In our example of integers mod p:
– Enc(b) = 2(r+subset-sum(xi’s)) + b mod N
= p + 2(r+subset-sum(ri’s))+b
much smaller
than p/2
– Dec(c) = (c mod p) mod 2
29. Additive Homomorphism
• c1+c2 = (codeword1+codeword2)
+ (2r1+b1)+(2r2+b2 )
– codeword1+codeword2 Code
– (2r1+b1)+(2r2+b2 )=2(r1+r2)+b1+b2 is still small
• If 2(r1+r2)+b1+b2 < min-dist/2, then
dist(c1+c2, Code) = 2(r1+r2)+b1+b2
dist(c1+c2, Code) b1+b2 (mod 2)
• Additively-homomorphic while close to Code
30. Step 2: Code Lives in a Ring
• What happens when multiplying in Ring:
– c1∙c2 = (codeword1+2r1+b1)∙(codeword2+2r2+b2)
= codeword1∙X + Y∙codeword2
+ (2r1+b1)∙(2r2+b2) Code is an ideal
• If:
– codeword1∙X + Y∙codeword2 Code
– (2r1+b1)∙(2r2+b2) < min-dist/2
Product in Ring of
• Then small elements is small
– dist(c1c2, Code) = (2r1+b1)∙(2r2+b2) = b1∙b2 mod 2
31. Example: Integers mod p [vDGHV 2010]
p N
xi = pqi + ri
• Secret-key is p, public-key is N and the xi’s
• ci = Encpk(bi) = 2(r+subset-sum(xi’s)) + b mod N
= kip + 2ri+bi
– Decsk(ci) = (ci mod p) mod 2
• c1+c2 mod N = (k1p+2r1+b1)+(k2p+2r2+b2) – kqp
= k’p + 2(r1+r2) + (b1+b2)
• c1c2 mod N = (k1p+2r1+b1)(k2p+2r2+b2) – kqp
= k’p + 2(2r1r2+r1b2+r2b1)+b1b2
• Additive, multiplicative homomorphism
– As long as noise < p/2
32. Summary Up To Now
• We need a linear error-correcting code C
– With “good” and “bad” representations
– C lives inside an algebraic ring R
– C is an ideal in R
– Sum, product of small elements in R is still small
• Can find such codes in Euclidean space
– Often associated with lattices
• Then we get a “somewhat homomorphic”
encryption, supporting low-degree polynomials
– Homomorphism while close to the code
33. Step 3: Bootstrapping
• So far, can evaluate low-degree polynomials
x1 P
x2
… P(x1, x2 ,…, xt)
xt
34. Step 3: Bootstrapping
• So far, can evaluate low-degree polynomials
x1 P
x2
… P(x1, x2 ,…, xt)
xt
• Can eval y=P(x1,x2…,xn) when xi’s are “fresh”
• But y is an “evaluated ciphertext”
– Can still be decrypted
– But eval Q(y) will increase noise too much
• “Somewhat Homomorphic” encryption (SWHE)
35. Step 3: Bootstrapping
• So far, can evaluate low-degree polynomials
x1 P
x2
… P(x1, x2 ,…, xt)
xt
• Bootstrapping to handle higher degrees
– We have a noisy evaluated ciphertext y
– Want to get another y with less noise
36. Step 3: Bootstrapping
• For ciphertext c, consider Dc(sk) = Decsk(c)
– Hope: Dc( ) is a low-degree polynomial in sk
• Include in the public key also Encpk(sk)
c y
Requires
“circular
Dc security”
sk1
sk2 c’ Dc(sk)
…
= Decsk(c) = y
skn
• Homomorphic computation applied only to the
“fresh” encryption of sk
37. Step 3: Bootstrapping
• Similarly define Mc ,c (sk) = Decsk(c1)∙Decsk(c1)
1 2
y1 y2
c1 c2
sk1 Mc1,c2
c’
sk2
Mc1,c2(sk)
…
= Decsk(c1) x Decsk(c2) = y1 x y2
skn
• Homomorphic computation applied only to the
“fresh” encryption of sk
38. Step 4: Everything Else
• Cryptosystems from *G’09, vDGHV’10, BG’11a]
cannot handle their own decryption
• Tricks to “squash” the decryption
procedure, making it low-degree
– Nontrivial, requires putting more information
about the secret key in the public key
– Requires yet another assumption, namely hardness
of the Sparse-Subset-Sum Problem (SSSP)
– I will not talk about squashing here