Research Article
Secure Computation for Data Privacy
@INPROCEEDINGS{10.1109/SECCOM.2007.4550308, author={Meena Singh and Ashutosh Saxena}, title={Secure Computation for Data Privacy}, proceedings={3rd International ICST Workshop on the Value of Security through Collaboration}, publisher={IEEE}, proceedings_a={SECOVAL}, year={2008}, month={6}, keywords={Data Privacy Mobile Code Reducible Rank Code Secure Computation.}, doi={10.1109/SECCOM.2007.4550308} }
- Meena Singh
Ashutosh Saxena
Year: 2008
Secure Computation for Data Privacy
SECOVAL
IEEE
DOI: 10.1109/SECCOM.2007.4550308
Abstract
The Secure Mobile Code is a fragment of code being executed in some unfamiliar and untrusted environment. Protecting integrity and maintaining confidentially of the code execution in unfamiliar environment has been a challenging task. The host environment may try to guess the functionality of the code received. This generates a need to design a scheme that can perform secure computation on encoded data and leaving no clues for the host to guess the functionality and data. In our scheme, the sender will generate the code which is transformed to hide the functionality and she will send it along with encoded data to the host. Subsequently, the host will run the code on the encoded data and send the result to the sender. The functionality is protected by the encoded gates where the truth table is transformed using the Reducible Rank Codes[1]. We also present a detail security analysis and complexity of our scheme. Our scheme finds application where the data computation has been outsourced to other party.