On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation

被引:0
|
作者
Zhao, Liang [1 ]
Yu, Jie [1 ]
Zhang, Yiheng [1 ]
Chen, Liqun [2 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Sichuan, Peoples R China
[2] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, England
基金
中国国家自然科学基金;
关键词
Privacy analysis; uniform distribution; semantic security; indistinguishability;
D O I
10.1109/TDSC.2023.3277285
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving Verifiable (outsourced) Computation (PVC) for face recognition is a significant research topic in the information security community. Recently, an efficient elementary matrices masking-based PVC protocol for face recognition has been published in IEEE Transactions on Dependable and Secure Computing (Ren et al. 2023). In this article, we analyze the privacy property of this protocol, and demonstrate that the output distribution of the problem generation algorithm in this protocol is not computationally indistinguishable from the uniform distribution over a matrix set, which breaks the original consequence (see Theorem 1). We introduce a formal definition of a privacy model for a PVC protocol and prove that the targeted PVC protocol does not hold privacy under this model. We then present experimental results to support our theoretical analyses.
引用
收藏
页码:4299 / 4301
页数:3
相关论文
共 50 条
  • [1] On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation
    Zhao, Liang
    Chen, Liqun
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1296 - 1298
  • [2] Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited
    Zhao, Liang
    Chen, Liqun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1188 - 1206
  • [3] Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited
    Zhao, Liang
    Chen, Liqun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3671 - 3687
  • [4] Verifiable Outsourced Computation: A Survey
    Gennaro, Rosario
    [J]. PROCEEDINGS OF THE ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'17), 2017, : 313 - 313
  • [5] Batch verifiable computation of outsourced functions
    Liang Feng Zhang
    Reihaneh Safavi-Naini
    [J]. Designs, Codes and Cryptography, 2015, 77 : 563 - 585
  • [6] Verifiable Outsourced Computation with Full Delegation
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Zifeng
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 270 - 287
  • [7] Revocation in Publicly Verifiable Outsourced Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 51 - 71
  • [8] Batch verifiable computation of outsourced functions
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 563 - 585
  • [9] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [10] Towards Verifiable Resource Accounting for Outsourced Computation
    Chen, Chen
    Maniatis, Petros
    Perrig, Adrian
    Vasudevan, Amit
    Sekar, Vyas
    [J]. ACM SIGPLAN NOTICES, 2013, 48 (07) : 167 - 178