Homomorphic encryption, which allows calculations to be performed on encrypted data, has typically encrypted data at the bit-level. Furthermore, when performing statistical calculations between encrypted data, after multiplying each bit in each piece of encrypted data, the results are added to calculate an inner product. This is problematic in that processing times are directly proportional to bit lengths, making practical implementation of this method difficult.
About the Technology
1. Faster batch encryption of multiple bits
When encrypting two plain texts, this takes advantage of the characteristics of polynomial multiplication, reordering the bit string of one in ascending order, the other in descending order, and then converting both to polynomials, which makes it possible for inner products of encrypted bit strings to be calculated as a batch. Compared to the conventional bit-by-bit ciphering process, this results in dramatically faster performance. For example, with 2048 bits of data, the process can be as much as 2048 times as fast. The processing time in proportion to the bit length is greatly reduced.
2. Permits many practical encipher functions
This technology makes it possible to perform numerous useful calculations on enciphered data, such as totals, averages, and standard deviations (which are widely used statistical functions), correlation analysis, and comparisons on biometric data.
This technology makes it possible to use data while safeguarding privacy. For example, an application of this technology that compares biometric data could keep highly secret fingerprints or vein patterns encrypted during the comparison process. With a 2,048-bit feature code extracted from vein-pattern information, that code can be encrypted using homomorphic encryption and the resulting encrypted data can be compared. While the comparison process would take a dozen seconds or more using typical methods, with this technique it can be done in several milliseconds.
Biometric authentication is already being used by banks and corporations for high-security systems, but keeping that biometric information always secure with encryption will make these systems easier to use, as well as open up new areas for short-term identity verification, such as in theme parks, resort hotels, and airport baggage claims, using the human body in place of a key or password.
This technology also opens the door to analysis of highly personal information, such as medical or biological data, by enabling companies to share information while maintaining a wall of privacy.
Glossary and Notes
An encryption method that allows mathematical operations, such as addition and multiplication, to be performed on encrypted data. Because the results are also encrypted, learning the results requires access to a private key.
Founded in 1968 as a wholly owned subsidiary of
Tel: +81 (0) 3-6252-2174
Fax: +81 (0) 3-6252-2783
[Editorial queries for this story should be sent to email@example.com]
((Comments on this story may be sent to firstname.lastname@example.org))
Most Popular Stories
- Boehner Lashes Out Against Ted Cruz, Far Right
- TFA Recruiting DACA Recipients
- Hawaii Official Who Release Obama Certificate Only Victim of Plane Crash
- Holiday Shopping Off to a Slow Start This Season
- Ford Plans New Cars, Jobs in 2014
- Gold, Silver Slide on Prospects of Fed Exit
- 'Rape Insurance' Bill Passes in Michigan
- Ted Cruz Coloring Book Selling Briskly
- Kim Jong Un's Uncle Executed
- Scotch Whisky Sales Raise Distillers' Spirits