Homomorphic multi-party computation for Internet of Medical Things

被引:0
|
作者
Hosseingholizadeh, Amin [1 ]
Rahmati, Farhad [1 ]
Ali, Mohammad [1 ]
Liu, Ximeng [2 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Fuzhou Univ, Coll Comp & Data Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
关键词
Internet of Medical Things; Data confidentiality; Homomorphic cryptosystems; Multiparty computation; Function security; RING-LWE; ENCRYPTION; OBFUSCATION; SECURITY;
D O I
10.1007/s12083-024-01805-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Medical Things (IoMT) has great potential in delivering medical services. In IoMT, data users (e.g., doctors) may want to process data collected by sensors attached to data owners' body (e.g., patients). As sensors lack computing resources, confidential outsourcing the data to a server becomes necessary due to its sensitivity. Using homomorphic encryption raises limitations in secure processing. First, as decrypting the processed result requires the data owners' secret key, they must be online or share it with data users. Second, when processing is performed on the data of multiple data owners, the interaction becomes harder. Finally, if the processed result is sensitive, it lacks confidentiality as data owners may access it. In this paper, we propose a non-interactive homomorphic multi-party computation (HMPC) protocol, addressing the limitations efficiently. In HMPC, data owners encrypt their data with their own key and store it in a cloud server. Then, data users select the required data from the cloud server and outsource their own encrypted data to the server for processing. Afterwards, they decrypt the result regardless of the circuit computed and without interaction with the data owners. Our security and performance analyses demonstrate that HMPC is provably secure and applicable.
引用
收藏
页码:4049 / 4069
页数:21
相关论文
共 50 条
  • [1] Internet Transparency Through Multi-party Computation
    Mackowiak, Pawel
    Kuipers, Fernando
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 481 - 495
  • [2] Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
    Al-Otaibi, Yasser D.
    SOFT COMPUTING, 2021, 25 (18) : 12131 - 12144
  • [3] Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
    Yasser D. Al-Otaibi
    Soft Computing, 2021, 25 : 12131 - 12144
  • [4] Secure Multi-Party Computation Based on Multi-Bit Fully Homomorphic Encryption
    基于多比特全同态加密的安全多方计算
    1600, Science Press (44): : 836 - 845
  • [5] Secure Cloud Computing Algorithm Using Homomorphic Encryption And Multi-Party Computation
    Das, Debasis
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 391 - 396
  • [6] SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things
    Li, Cheng
    Yang, Li
    Yu, Shui
    Qin, Wenjing
    Ma, Jianfeng
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 2792 - 2797
  • [7] Everlasting Multi-party Computation
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 380 - 397
  • [8] Covert multi-party computation
    Chandran, Nishanth
    Goyal, Vipul
    Ostrovsky, Rafail
    Sahai, Arnit
    48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, : 238 - 248
  • [9] Everlasting Multi-party Computation
    Dominique Unruh
    Journal of Cryptology, 2018, 31 : 965 - 1011
  • [10] Everlasting Multi-party Computation
    Unruh, Dominique
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 965 - 1011