Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud

被引:1
|
作者
Xia, Zhe [1 ,2 ]
Yang, Qiliang [3 ]
Qiao, Zirui [3 ]
Feng, Feng [4 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci & Artificial Intelligence, Wuhan 430070, Peoples R China
[2] Guizhou Univ, Guizhou Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
[4] Ningxia Univ, Sch Informat Engn, Yinchuan 750021, Peoples R China
关键词
Quorum controlled cryptosystems; Homomorphic re-encryption; Provable security; Privacy preserving computations; Cloud computing; DISTRIBUTED KEY GENERATION; SECURE; DECRYPTION; PROOFS; SCHEME;
D O I
10.1016/j.ins.2022.11.084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides services to store users' data, so that they can access it anytime, anywhere at their convenience. In order to preserve data privacy, the data is encrypted before being uploaded to the cloud platform. But it is challenging to process and analyse the encrypted data as well as manage its access control. In Information Sciences 2017, Ding et al. have proposed a novel solution to address this challenge, which consists of a homomorphic re-encryption scheme (HRES) and a toolkit of several basic operations over ciphertexts. Ding's work has good potentials for various cloud-based applications in which privacy preserving computations are required and the processed results are shared among multiple users. However, the HRES scheme relies on some relatively strong assumptions, making it less practical for real-world applications. For example, the system parameters have to be generated by a trusted third party (TTP), the two proxies who execute the decryption and re-encryption processes have to follow the protocol, and they can neither be out-of-service nor collude. In this paper, we relax these assumptions by extending the HRES scheme into a quorum controlled homomorphic re-encryption scheme (QHRES). Both the decryption and re-encryption processes are carried out by multiple proxies in a distributed fashion, and all the desirable security properties are guaranteed if there exists a quorum of honest proxies. Moreover, no TTP is required and every proxy's behaviour can be publicly verified. Our extension inherits the homomorphic property as in HRES and it also supports the basic operations over ciphertexts. Therefore, it contributes to a more practical privacy preserving data processing system for real-world applications in the cloud.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:58 / 73
页数:16
相关论文
共 50 条
  • [1] Privacy-Preserving Distributed Deep Learning via Homomorphic Re-Encryption
    Tang, Fengyi
    Wu, Wei
    Liu, Jian
    Wang, Huimei
    Xian, Ming
    [J]. ELECTRONICS, 2019, 8 (04)
  • [2] Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption
    Ku, Hanchao
    Susilo, Willy
    Zhang, Yudi
    Liu, Wenfen
    Zhang, Mingwu
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [3] Offline privacy preserving proxy re-encryption in mobile cloud computing
    Koe, Arthur Sandor Voundi
    Lin, Yaping
    [J]. PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [4] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [5] PAC: Privacy preserving proxy re-encryption for access control in public cloud
    Chaudhari, Payal
    Das, Manik Lal
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 612 - 627
  • [6] PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System
    Chen, Yange
    Wang, Baocang
    Zhang, Zhili
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2032 - 2043
  • [7] On quorum controlled asymmetric proxy re-encryption
    Jakobsson, M
    [J]. PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 112 - 121
  • [8] Cloud Assisted Privacy Preserving Using Homomorphic Encryption
    Hariss, Khalil
    Chamoun, Maroun
    Samhat, Abed Ellatif
    [J]. 2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
  • [9] Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption
    Shen, Xiaoying
    Luo, Xue
    Yuan, Feng
    Wang, Baocang
    Chen, Yange
    Tang, Dianhua
    Gao, Le
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
  • [10] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161