Evaluating Branching Programs on Encrypted Data

@inproceedings{Ishai2007EvaluatingBP,
  title={Evaluating Branching Programs on Encrypted Data},
  author={Yuval Ishai and Anat Paskin-Cherniavsky},
  booktitle={TCC},
  year={2007}
}
We present a public-key encryption scheme with the following properties. Given a branching program P and an encryptionc of an inputx, it is possible to efficiently compute a succinctciphertextc′ from whichP (x) can be efficiently decoded using the secret key. The size of c′ depends polynomially on the size ofx and thelengthof P , but does not further depend on the size of P . As interesting special cases, one can efficiently evaluate finite automata, decision trees, and OBDDs on encrypted data… CONTINUE READING
Highly Influential
This paper has highly influenced a number of papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 173 citations. REVIEW CITATIONS

1 Figure or Table

Topics

Statistics

0102030'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

173 Citations

Semantic Scholar estimates that this publication has 173 citations based on the available data.

See our FAQ for additional information.