Secure and collusion-resistant data aggregation from convertible tags

被引:2
|
作者
Leontiadis, Iraklis [1 ,2 ]
Li, Ming [3 ]
机构
[1] Inpher, New York, NY 10010 USA
[2] Inpher, Lausanne, Switzerland
[3] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
关键词
Data privacy; Data security; Convertible tags; Collusion-resistant aggregation; FAULT-TOLERANCE;
D O I
10.1007/s10207-019-00485-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The progress in communication and hardware technology increases the computational capabilities of personal devices. Aggregators, acting as third parties, are interested in learning a statistical function as the sum over a census of data. Users are reluctant to reveal their information in cleartext, since it is treated as personal sensitive information. The paradoxical paradigm of preserving the privacy of individual data while granting an untrusted third party to learn in cleartext a function thereof, is partially addressed by the current privacy-preserving aggregation protocols. Current solutions are either focused on an honest-but-curious Aggregator who is trusted to follow the rules of the protocol or model a malicious Aggregator with trustworthy users. In this paper, we are the first to propose a protocol with fully malicious users who collude with a malicious Aggregator in order to forge a message of a trusted user. We introduce the new cryptographic primitive of convertible tag, that consists of a two-layer authentication tag. Users first tag their data with their secret key and then an untrusted Converter converts the first layer tags in a second layer. The final tags allow the Aggregator to produce a proof for the correctness of a computation over users' data. Security and privacy of the scheme is preserved against the Converter and the Aggregator, under the notions of Aggregator obliviousness and Aggregate unforgeability security definitions, augmented with malicious users. Our protocol is provably secure, and experimental evaluations demonstrate its practicality.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [1] Secure and collusion-resistant data aggregation from convertible tags
    Iraklis Leontiadis
    Ming Li
    [J]. International Journal of Information Security, 2021, 20 : 1 - 20
  • [2] Collusion-resistant convertible ring signature schemes
    Jung Yeon Hwang
    Ku-Young Chang
    Hyun Sook Cho
    Boyeon Song
    Willy Susilo
    [J]. Science China Information Sciences, 2015, 58 : 1 - 16
  • [3] Collusion-resistant convertible ring signature schemes
    HWANG Jung Yeon
    CHANG Ku-Young
    CHO Hyun Sook
    SONG Boyeon
    SUSILO Willy
    [J]. Science China(Information Sciences), 2015, 58 (01) : 134 - 149
  • [4] Collusion-resistant convertible ring signature schemes
    Hwang, Jung Yeon
    Chang, Ku-Young
    Cho, Hyun Sook
    Song, Boyeon
    Susilo, Willy
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (01) : 1 - 16
  • [5] A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System
    Xu, Chang
    Shen, Xiaodong
    Zhu, Liehuang
    Zhang, Yan
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [6] Collusion-Resistant Anonymous Data Collection Method
    Ashrafi, Mafruz Zaman
    Ng, See Kiong
    [J]. KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, : 69 - 77
  • [7] Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
    Hiroka, Taiga
    Kitagawa, Fuyuki
    Morimae, Tomoyuki
    Nishimaki, Ryo
    Pal, Tapas
    Yamakawa, Takashi
    [J]. ADVANCES IN CRYPTOLOGY, PT III, EUROCRYPT 2024, 2024, 14653 : 434 - 456
  • [8] Collusion-resistant fingerprinting for multimedia
    Trappe, W
    Wu, M
    Liu, KR
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3309 - 3312
  • [9] Data hiding in curves for collusion-resistant digital fingerprinting
    Gou, HM
    Wu, M
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 51 - 54
  • [10] Collusion-resistant fingerprints from WBE sequence sets
    Li, Z
    Trappe, W
    [J]. ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 1336 - 1340