论文标题
使用功能加密重新访问安全计算:机会和研究方向
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions
论文作者
论文摘要
安全妥协和隐私泄漏事件的日益增加引发了与网络空间有关的严重隐私问题。这种隐私问题在创建几项法规和行为以限制对隐私敏感数据的可用性和使用方面发挥了作用。最初并正式地引入了Andrew Yao于1986年作为安全的两党计算的安全计算问题一直是学术界强烈研究的重点,因为它在构建许多现有的隐私保护方法方面具有基本作用。大多数现有的安全计算解决方案都依靠乱码和同构加密技术来解决安全的计算问题,包括效率和安全保证。但是,在新兴的计算密集型和数据密集型应用程序(例如新兴的机器学习解决方案)中采用这些安全的计算方法仍然具有挑战性。最近提出的功能加密方案显示了其在最近提出的最新隐私机器学习方法中作为基础安全计算基础的承诺。本文使用新兴和有希望的功能加密技术重新审视了安全的计算问题,并提供了一项全面的研究。我们首先简要总结了建立在乱码,遗忘转移和同形加密技术上的现有常规安全计算方法。然后,我们详细介绍了基于新兴功能加密的安全计算方法的独特特征和挑战,并概述了几个研究方向。
Increasing incidents of security compromises and privacy leakage have raised serious privacy concerns related to cyberspace. Such privacy concerns have been instrumental in the creation of several regulations and acts to restrict the availability and use of privacy-sensitive data. The secure computation problem, initially and formally introduced as secure two-party computation by Andrew Yao in 1986, has been the focus of intense research in academia because of its fundamental role in building many of the existing privacy-preserving approaches. Most of the existing secure computation solutions rely on garbled-circuits and homomorphic encryption techniques to tackle secure computation issues, including efficiency and security guarantees. However, it is still challenging to adopt these secure computation approaches in emerging compute-intensive and data-intensive applications such as emerging machine learning solutions. Recently proposed functional encryption scheme has shown its promise as an underlying secure computation foundation in recent privacy-preserving machine learning approaches proposed. This paper revisits the secure computation problem using emerging and promising functional encryption techniques and presents a comprehensive study. We first briefly summarize existing conventional secure computation approaches built on garbled-circuits, oblivious transfer, and homomorphic encryption techniques. Then, we elaborate on the unique characteristics and challenges of emerging functional encryption based secure computation approaches and outline several research directions.