689 research outputs found

    Homomorphic Data Isolation for Hardware Trojan Protection

    Full text link
    The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content. In this work, we suggest using homomorphism for Hardware Trojan protection. We implement two partial homomorphic designs based on ElGamal encryption/decryption scheme. The first design is a multiplicative homomorphic, whereas the second one is an additive homomorphic. We implement the proposed designs on a low-cost Xilinx Spartan-6 FPGA. Area utilization, delay, and power consumption are reported for both designs. Furthermore, we introduce a dual-circuit design that combines the two earlier designs using resource sharing in order to have minimum area cost. Experimental results show that our dual-circuit design saves 35% of the logic resources compared to a regular design without resource sharing. The saving in power consumption is 20%, whereas the number of cycles needed remains almost the sam

    Encrypted statistical machine learning: new privacy preserving methods

    Full text link
    We present two new statistical machine learning methods designed to learn on fully homomorphic encrypted (FHE) data. The introduction of FHE schemes following Gentry (2009) opens up the prospect of privacy preserving statistical machine learning analysis and modelling of encrypted data without compromising security constraints. We propose tailored algorithms for applying extremely random forests, involving a new cryptographic stochastic fraction estimator, and na\"{i}ve Bayes, involving a semi-parametric model for the class decision boundary, and show how they can be used to learn and predict from encrypted data. We demonstrate that these techniques perform competitively on a variety of classification data sets and provide detailed information about the computational practicalities of these and other FHE methods.Comment: 39 page

    Integrated Security Protocol for Electronic Election System

    Get PDF
    Electronic election systems are a sensitive application and security is a major concern. This process should be ensured to maintain the integrity and confidentiality of the casted votes and voters authentication before they casts their votes. Besides security, other issues need to be considered such as; simplicity, reliability, convenience, flexibility, mobility and cost. In this paper, an integrated security protocol and a prototype of a web-based electronic election system is proposed by integrating two techniques; the first technique is a new zero knowledge mutual authentication protocol based on Diffie-Hellman (D-H ZKP) key exchange algorithm, to enforce a mutual authentication between the election authority server and the voters and exchange secret key securely. The second technique is homomorphic encryption scheme to encrypt all the votes and perform the calculation of the votes without revealing any information about it to ensure the secrecy of the votes and maintain the confidentiality. The proposed protocol provides secure voting over the Internet and maintains the requirements of the election process. Keywords: E-election, D-H ZKP, Homomorphic Encryption
    corecore