Thank you for your presentation :)
I have a few questions about this paper.
(1) The paper title mentioned about "End-to-End cryptographic communication", but why intermediate nodes in your paper have to do the traffic inspection?
Please kindly explain this. I don't get what kind of problem you are trying to solve.
(2) In your conclusion on Slide No. 16, you mentioned about the privacy protection.
How can we achieve the privacy protection if the intermediate nodes have to decrypt the ciphertext in the AES case?
It is not surprising to see the linear increase of AES transmission time in Slide 13 when you increased to 50 intermediate nodes, cause each of them must do the decryption.
Thank you.
Thank you for the good question.
(1) In the experiment of this paper, it is assumed that any operation, such as traffic inspection, can be performed at the intermediate node. So it's not really a process of inspecting traffic, it just shows that this can happen. This paper assumes this environment, which is not exactly the same as the actual network communication environment. However, we can prove that it is not impossible to utilize homomorphic encryption in end-to-end cryptographic communication.
(2) The purpose of this paper is to experimentally show the environment in which homomorphic encryption can be used, and AES is the object of comparison. Therefore, I would appreciate it if you understand that this paper focuses on homomorphic encryption. Accordingly, as you asked, AES cannot fully guarantee privacy.
I hope I have answered your questions.