Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT

被引:6
|
作者
Rezaeibagha, Fatemeh [1 ,2 ]
Mu, Yi [3 ]
Huang, Ke [4 ]
Chen, Lanxiang [5 ]
Zhang, Leyou [6 ]
机构
[1] Murdoch Univ, Discipline Informat Technol, HBI Inst, Murdoch, WA 6150, Australia
[2] Murdoch Univ, Hlth Ageing Ctr, Murdoch, WA 6150, Australia
[3] City Univ Macau, Fac Data Sci, Macau 999078, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610056, Sichuan, Peoples R China
[5] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[6] Xidian Univ, Sch Math & Stat, Xian 710126, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; data security; homomorphic encryption; DATA AGGREGATION SCHEME; PRIVACY; ENCRYPTION; SECURE;
D O I
10.1109/TSC.2022.3211349
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of Internet of Things (IoT) and cloud computing are always seen as promising technologies to enhance streamlined data collection, share and exchange. Although the advances in edge computing, particularly mobile edge computing (MEC), could enhance the performance of data collection and computation via computing offloading, security and privacy impediments have made new challenges to data integrity and confidentiality, in particular when multiple edges or nodes at different locations collect IoT data. Homomorphic encryption therefore has shown promising advantages for cloud computing, offering arithmetic operations to be carried out on the encrypted data without revealing the secret key. While fully homomorphic encryption introduced by Gentry, in 2009, allows both additive and multiplicative operations, it has shown significant implementation drawbacks due to the parameters generation and memory consumption. In this work, we focus on partially homomorphic encryption, which can be efficiently computed. However, it is challenging to add authentication feature for the verification and aggregation capability. We propose a novel secure and privacy preserving authenticable homomorphic encryption (AHEC) scheme. We demonstrate an application of our AHEC scheme for MEC-based IoT systems and provide security analysis to prove that our scheme is secure against chosen plaintext attack (IND-CPA) and unforgeability (UNF) under DDH-ZN2 and Lift-DH-ZN2 assumptions. Experimental results show that our proposed scheme is efficient for practical applications.
引用
收藏
页码:1664 / 1672
页数:9
相关论文
共 50 条
  • [21] A homomorphic signcryption scheme and its application in electronic voting
    Zhang, Peng
    Yu, Jian-Ping
    Liu, Hong-Wei
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2011, 28 (06): : 489 - 494
  • [22] A symmetric additive homomorphic encryption scheme based on NTRU proxy rekeys
    Liu, Wei
    Hao, Xiaohua
    Wan, Ailan
    Xu, Kai
    Han, Mu
    Zhu, Xiaolong
    PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON CYBER SECURITY, CSW 2022, 2022, : 25 - 33
  • [23] A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT
    Su, Yunxuan
    Xu An Wang
    Du, Weidong
    Ge, Yu
    Zhao, Kaiyang
    Lv, Ming
    JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (01) : 41 - 56
  • [24] A key leakage resistant linearly homomorphic signature scheme and its application
    Wu, Bin
    Shi, Ning
    Li, Yahong
    Wu, Kaijun
    Wang, Caifen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)
  • [25] Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
    Li R.
    Jia C.
    Wang Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 11 - 22
  • [26] Lattice based distributed threshold additive homomorphic encryption with application in federated learning
    Tian, Haibo
    Wen, Yanchuan
    Zhang, Fangguo
    Shao, Yunfeng
    Li, Bingshuai
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [27] Reward-based service provisioning scheme for UAV-MEC assisted IoT infrastructures
    Chowdhury, Mahfuzulhoq
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2021, 37 (02) : 113 - 124
  • [28] A Secure, Flexible, and PPG-Based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest
    Zhang, Liping
    Li, Anzi
    Chen, Shukai
    Ren, Wei
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 612 - 622
  • [29] Secure Data Delivery With Identity-Based Linearly Homomorphic Network Coding Signature Scheme in IoT
    Li, Yumei
    Zhang, Futai
    Liu, Xin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2202 - 2212
  • [30] A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application
    Eltayieb, Nabeil
    Elhabob, Rashad
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83