Figure 6: Memory Access.
coefficients and ciphers are also shown in that figure.
5 OPEN ISSUES & FUTURE
WORK
The environmentpresented in this paper has proof-of-
concept capabilities and a dependency between mem-
ory size and performance, which makes it suitable for
small problem sizes. By extending the capabilities of
our concept to interact with the host system, we will
be able to perform calculations on portions of secret
data or secret algorithms, that are part of a larger sys-
tem. It is possible to inject encrypted data into the
encrypted environment, which is sufficient to receive
process data from outside the cipher-space. However,
this induces further problems, like the correctness and
consistency of the encrypted code and data. A pos-
sible field of application is Cloud Computing, where
small- and medium-scale compute jobs are performed
which have high privacy requirements. The estab-
lishment of an appropriate system- and application-
architecture will be the key to integrate our concept
into existing cloud applications and environments, to
face new security requirements of mobile code and
distributed applications.
6 SUMMARY
In this paper we presented the first method to per-
form the execution of arbitrary encrypted programs,
operating on encrypted data. In contrast to other so-
lutions, the code as well as the processed data, held
entirely in the cipher-space, still remain dynamic and
can be provided with data after having been transmit-
ted to the executing host. We described a method to
represent circuits by means of homomorphically en-
crypted arithmetics. Applying the basic logic func-
tion representations, we sketched how to build dif-
ferent microprocessor primitives, like memory-access
logic and arithmetic operations. We then developed
a simple CPU- and system-model and presented the
reference implementation of our model on top of the
Smart-Gentry encryption scheme. An analysis deter-
mined the relationship between our system model and
the underlying encryption scheme. We provided per-
formance figures for different key sizes and showed
that our system is suitable to act as a sound basis for
further empirical investigation of applied homomor-
phic encryption.
REFERENCES
Abadi, M. and Feigenbaum, J. (1990). Secure cir-
cuit evaluation. Journal of Cryptology, 2:1–12.
10.1007/BF02252866.
Brenner, M., Wiebelitz, J., von Voigt, G., and Smith, M.
(2011). Secret program execution in the cloud apply-
ing homomorphic encryption. In Proceedings of the
5th IEEE International Conference on Digital Ecosys-
tems (DEST 2011), to appear, DEST’11, USA. IEEE.
Cybenko, G. (2007). System and methods for encrypted
execution of computer programs.
Gentry, C. (2009). Fully homomorphic encryption using
ideal lattices. In Proceedings of the 41st annual ACM
symposium on Theory of computing, STOC ’09, pages
169–178, New York, NY, USA. ACM.
Goldreich, O. and Ostrovsky, R. (1996). Software pro-
tection and simulation on oblivious rams. J. ACM,
43:431–473.
Hennessy, J. L. and Patterson, D. A. (2006). Computer Ar-
chitecture. A Quantitative Approach. Academic Press.
Kolesnikov, V., Sadeghi, A.-R., and Schneider, T. (2009).
How to combine homomorphic encryption and gar-
bled circuits - improved circuits and computing the
minimum distance efficiently. In Signal Process-
ing in the Encrypted Domain, SPEED’09, Lausanne,
Switzerland. SPEED Project.
Lee, H., Alves-Foss, J., and Harrison, S. (2001). Secur-
ing mobile agents through evaluation of encrypted
functions. Technical report, Center for Secure and
Dependable Software Computer Science Department,
University of Idaho.
Malkhi, D., Nisan, N., Pinkas, B., and Sella, Y. (2004).
Fairplay - a secure two-party computation system. In
Proceedings of the 13th conference on USENIX Secu-
rity Symposium - Volume 13, SSYM’04, pages 20–20,
Berkeley, CA, USA. USENIX Association.
Pinkas, B. and Reinman, T. (2010). Oblivious ram revisited.
In Rabin, T., editor, Advances in Cryptology CRYPTO
2010, volume 6223 of Lecture Notes in Computer Sci-
ence, pages 502–519. Springer Berlin / Heidelberg.
10.1007/978-3-642-14623-7 27.
Sander, T. and Tschudin, C. (1998a). Protecting mobile
agents against malicious hosts. In Vigna, G., editor,
Mobile Agents and Security, volume 1419 of LNCS,
pages 44–60. Springer Berlin / Heidelberg. 10.1007/3-
540-68671-1 4.
A SMART-GENTRY BASED SOFTWARE SYSTEM FOR SECRET PROGRAM EXECUTION
243