Homomorphic multi-party computation for Internet of Medical Things

被引:0
|
作者
Hosseingholizadeh, Amin [1 ]
Rahmati, Farhad [1 ]
Ali, Mohammad [1 ]
Liu, Ximeng [2 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Fuzhou Univ, Coll Comp & Data Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
关键词
Internet of Medical Things; Data confidentiality; Homomorphic cryptosystems; Multiparty computation; Function security; RING-LWE; ENCRYPTION; OBFUSCATION; SECURITY;
D O I
10.1007/s12083-024-01805-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Medical Things (IoMT) has great potential in delivering medical services. In IoMT, data users (e.g., doctors) may want to process data collected by sensors attached to data owners' body (e.g., patients). As sensors lack computing resources, confidential outsourcing the data to a server becomes necessary due to its sensitivity. Using homomorphic encryption raises limitations in secure processing. First, as decrypting the processed result requires the data owners' secret key, they must be online or share it with data users. Second, when processing is performed on the data of multiple data owners, the interaction becomes harder. Finally, if the processed result is sensitive, it lacks confidentiality as data owners may access it. In this paper, we propose a non-interactive homomorphic multi-party computation (HMPC) protocol, addressing the limitations efficiently. In HMPC, data owners encrypt their data with their own key and store it in a cloud server. Then, data users select the required data from the cloud server and outsource their own encrypted data to the server for processing. Afterwards, they decrypt the result regardless of the circuit computed and without interaction with the data owners. Our security and performance analyses demonstrate that HMPC is provably secure and applicable.
引用
收藏
页码:4049 / 4069
页数:21
相关论文
共 50 条
  • [21] On Concurrent Multi-party Quantum Computation
    Goyal, Vipul
    Liang, Xiao
    Malavolta, Giulio
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 129 - 161
  • [22] Differentially Private Multi-party Computation
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [23] Graceful Degradation in Multi-Party Computation
    Hirt, Martin
    Lucas, Christoph
    Maurer, Ueli
    Raub, Dominik
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 163 - 180
  • [24] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [25] A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things
    Liu, Jinhui
    Wen, Jiaming
    Zhang, Bowen
    Dong, Shunyu
    Tang, Bo
    Yu, Yong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 663 - 676
  • [26] On the Power of Hybrid Networks in Multi-Party Computation
    Patra, Arpita
    Ravi, Divya
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (06) : 4207 - 4227
  • [27] Recent Results in Scalable Multi-Party Computation
    Saia, Jared
    Zamani, Mahdi
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 24 - 44
  • [28] Multi-party computation with conversion of secret sharing
    Hossein Ghodosi
    Josef Pieprzyk
    Ron Steinfeld
    Designs, Codes and Cryptography, 2012, 62 : 259 - 272
  • [29] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [30] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569