6Processing Encrypted Multimedia Data Using Homomorphic Encryption

Sébastien CANARD1, Sergiu CARPOV2, Caroline FONTAINE3 and Renaud SIRDEY4

1Orange Labs, Applied Crypto Group, Caen, France

2Inpher, Lausanne, Switzerland

3LMF, ENS Paris-Saclay, University of Paris-Saclay, CNRS, Gif-sur-Yvette, France

4CEA, LIST, University of Paris-Saclay, Gif-sur-Yvette, France

In this chapter, we present the state of the art in homomorphic encryption techniques, which make it possible to process encrypted data. These techniques are very costly, but impressive progress has been made in recent years; experiments have already been carried out for industrial applications, including in the multimedia field. We shall present the results of some of these experiments, along with the theoretical background needed to understand their development.

6.1. Context

This chapter concerns encryption techniques in the cryptographic sense of the term, that is, techniques designed to ensure the confidentiality of data in general, regardless of its nature. We consider the data to be protected as bits, bit vectors or numbers. These data are first encoded in an alphabet or a suitable mathematical structure, depending on the chosen encryption technique.

Encryption techniques have been used since ancient times; their general development will not be discussed here. In this chapter, we shall focus on homomorphic techniques, in which operations performed on encrypted data are also performed, indirectly, on the underlying ...

Get Multimedia Security 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.