Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud

被引:1
|
作者
Xia, Zhe [1 ,2 ]
Yang, Qiliang [3 ]
Qiao, Zirui [3 ]
Feng, Feng [4 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci & Artificial Intelligence, Wuhan 430070, Peoples R China
[2] Guizhou Univ, Guizhou Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
[4] Ningxia Univ, Sch Informat Engn, Yinchuan 750021, Peoples R China
关键词
Quorum controlled cryptosystems; Homomorphic re-encryption; Provable security; Privacy preserving computations; Cloud computing; DISTRIBUTED KEY GENERATION; SECURE; DECRYPTION; PROOFS; SCHEME;
D O I
10.1016/j.ins.2022.11.084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides services to store users' data, so that they can access it anytime, anywhere at their convenience. In order to preserve data privacy, the data is encrypted before being uploaded to the cloud platform. But it is challenging to process and analyse the encrypted data as well as manage its access control. In Information Sciences 2017, Ding et al. have proposed a novel solution to address this challenge, which consists of a homomorphic re-encryption scheme (HRES) and a toolkit of several basic operations over ciphertexts. Ding's work has good potentials for various cloud-based applications in which privacy preserving computations are required and the processed results are shared among multiple users. However, the HRES scheme relies on some relatively strong assumptions, making it less practical for real-world applications. For example, the system parameters have to be generated by a trusted third party (TTP), the two proxies who execute the decryption and re-encryption processes have to follow the protocol, and they can neither be out-of-service nor collude. In this paper, we relax these assumptions by extending the HRES scheme into a quorum controlled homomorphic re-encryption scheme (QHRES). Both the decryption and re-encryption processes are carried out by multiple proxies in a distributed fashion, and all the desirable security properties are guaranteed if there exists a quorum of honest proxies. Moreover, no TTP is required and every proxy's behaviour can be publicly verified. Our extension inherits the homomorphic property as in HRES and it also supports the basic operations over ciphertexts. Therefore, it contributes to a more practical privacy preserving data processing system for real-world applications in the cloud.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:58 / 73
页数:16
相关论文
共 50 条
  • [31] Privacy-Preserving Collective Learning With Homomorphic Encryption
    Paul, Jestine
    Annamalai, Meenatchi Sundaram Muthu Selva
    Ming, William
    Al Badawi, Ahmad
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    [J]. IEEE ACCESS, 2021, 9 : 132084 - 132096
  • [32] PRIVACY PRESERVING DISTRIBUTED BEAMFORMING BASED ON HOMOMORPHIC ENCRYPTION
    Hendriks, Richard C.
    Erkin, Zekeriya
    Gerkmann, Timo
    [J]. 2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
  • [33] A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
    Yang, Wencheng
    Wang, Song
    Cui, Hui
    Tang, Zhaohui
    Li, Yan
    [J]. SENSORS, 2023, 23 (07)
  • [34] Privacy preserving Intrusion Detection via Homomorphic Encryption
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    Sgaglione, Luigi
    Cotroneo, Domenico
    Scognamiglio, Andrea
    [J]. 2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2019, : 321 - 326
  • [35] Privacy preserving distributed optimization using homomorphic encryption
    Lu, Yang
    Zhu, Minghui
    [J]. AUTOMATICA, 2018, 96 : 314 - 325
  • [36] A BGN-Type Homomorphic Proxy Re-Encryption Scheme
    Liu, Shu-Guang
    Zhang, Wei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 226 - 229
  • [37] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408
  • [38] FULLY HOMOMORPHIC SYMMETRIC KEY ENCRYPTION WITH SMITH NORMAL FORM FOR PRIVACY PRESERVING CLOUD PROCESSING
    Umadevi, C. N.
    Gopalan, N. P.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [39] Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts
    Kawai, Yutaka
    Matsuda, Takahiro
    Hirano, Takato
    Koseki, Yoshihiro
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 81 - 98
  • [40] Efficient Key Updates through Subscription Re-encryption for Privacy-Preserving Publish/Subscribe
    Onica, Emanuel
    Felber, Pascal
    Mercier, Hugues
    Riviere, Etienne
    [J]. PROCEEDINGS OF THE 16TH ANNUAL MIDDLEWARE CONFERENCE, 2015, : 25 - 36