An analysis of Structured Encryption compared to other secure computation technologies
A review of Structured Encryption schemes compared to Oblivious RAM, Multi-party Computation, Homomorphic Encryption and Trusted Execution Environments in the context of computing on encrypted data
D.N.G. Herbiet (TU Delft - Electrical Engineering, Mathematics and Computer Science)
E.A. Markatou – Mentor (TU Delft - Cyber Security)
T.J. Coopmans – Graduation committee member (TU Delft - QCD/Coopmans Group)
More Info
expand_more
Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.
Abstract
With the ever-growing cloud capacity in our society, being able to harness that immense computational power while keeping our data private has become a strong point of interest. This can be achieved with Structured Encryption, which allows a data structure to be encrypted and stored remotely, but still queryable by the client owning
the encryption key. This report is a literature review of the field of Structured Encryption (StE). We analyze the state-of-the-art technologies and their characteristics on the following aspects: security, efficiency, functionality and usability, and discuss their capabilities and limitations. We then compare StE schemes with other promising technologies in the area of computation on encrypted data: Fully Homomorphic Encryption, Oblivious RAM, Secure Multiparty Computation and Trusted Execution Environments.