Signal-processing modules working directly on encrypted data provide an elegant solution to application scenarios where valuable signals must be protected from a malicious processing device. In this paper, we investigate the implementation of the discrete Fourier transform (DFT) in the encrypted domain by using the homomorphic properties of the underlying cryptosystem. Several important issues are considered for the direct DFT: the radix-2 and the radix-4 fast Fourier algorithms, including the error analysis and the maximum size of the sequence that can be transformed. We also provide computational complexity analyses and comparisons. The results show that the radix-4 fast Fourier transform is best suited for an encrypted domain implementation in the proposed scenarios.

T., B., A., P., Barni, M. (2009). On the Implementation of the Discrete Fourier Transform in the Encrypted Domain. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 4(1), 86-97 [10.1109/TIFS.2008.2011087].

On the Implementation of the Discrete Fourier Transform in the Encrypted Domain

BARNI, MAURO
2009-01-01

Abstract

Signal-processing modules working directly on encrypted data provide an elegant solution to application scenarios where valuable signals must be protected from a malicious processing device. In this paper, we investigate the implementation of the discrete Fourier transform (DFT) in the encrypted domain by using the homomorphic properties of the underlying cryptosystem. Several important issues are considered for the direct DFT: the radix-2 and the radix-4 fast Fourier algorithms, including the error analysis and the maximum size of the sequence that can be transformed. We also provide computational complexity analyses and comparisons. The results show that the radix-4 fast Fourier transform is best suited for an encrypted domain implementation in the proposed scenarios.
2009
T., B., A., P., Barni, M. (2009). On the Implementation of the Discrete Fourier Transform in the Encrypted Domain. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 4(1), 86-97 [10.1109/TIFS.2008.2011087].
File in questo prodotto:
File Dimensione Formato  
edft.pdf

non disponibili

Tipologia: Post-print
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 602.03 kB
Formato Adobe PDF
602.03 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/25822
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo