Secure and collusion-resistant data aggregation from convertible tags

被引:3
|
作者
Leontiadis, Iraklis [1 ,2 ]
Li, Ming [3 ]
机构
[1] Inpher, New York, NY 10010 USA
[2] Inpher, Lausanne, Switzerland
[3] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
关键词
Data privacy; Data security; Convertible tags; Collusion-resistant aggregation; FAULT-TOLERANCE;
D O I
10.1007/s10207-019-00485-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The progress in communication and hardware technology increases the computational capabilities of personal devices. Aggregators, acting as third parties, are interested in learning a statistical function as the sum over a census of data. Users are reluctant to reveal their information in cleartext, since it is treated as personal sensitive information. The paradoxical paradigm of preserving the privacy of individual data while granting an untrusted third party to learn in cleartext a function thereof, is partially addressed by the current privacy-preserving aggregation protocols. Current solutions are either focused on an honest-but-curious Aggregator who is trusted to follow the rules of the protocol or model a malicious Aggregator with trustworthy users. In this paper, we are the first to propose a protocol with fully malicious users who collude with a malicious Aggregator in order to forge a message of a trusted user. We introduce the new cryptographic primitive of convertible tag, that consists of a two-layer authentication tag. Users first tag their data with their secret key and then an untrusted Converter converts the first layer tags in a second layer. The final tags allow the Aggregator to produce a proof for the correctness of a computation over users' data. Security and privacy of the scheme is preserved against the Converter and the Aggregator, under the notions of Aggregator obliviousness and Aggregate unforgeability security definitions, augmented with malicious users. Our protocol is provably secure, and experimental evaluations demonstrate its practicality.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [31] Statistical invisibility for collusion-resistant digital video watermarking
    Su, K
    Kundur, D
    Hatzinakos, D
    IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (01) : 43 - 51
  • [32] A Collusion-Resistant Automation Scheme for Social Moderation Systems
    Lou, Jing-Kai
    Chen, Kuan-Ta
    Lei, Chin-Laung
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 571 - +
  • [33] Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
    Penna, Paolo
    Ventre, Carmine
    ALGORITHMS - ESA 2008, 2008, 5193 : 708 - +
  • [34] Application of WBE sequence sets to collusion-resistant fingerprinting
    Li, Z
    Trappe, W
    INTERNET MULTIMEDIA MANAGEMENT SYSTEMS V, 2004, 5601 : 145 - 156
  • [35] A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing
    Yao, Shimao
    Sankar, Ravi
    Ra, In-Ho
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [36] Bounded Collusion-Resistant Registered Functional Encryption for Circuits
    Zhang, Yijian
    Chen, Jie
    He, Debiao
    Zhang, Yuqing
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT I, 2025, 15484 : 32 - 64
  • [37] Collusion-Resistant Repeated Double Auctions for Cooperative Communications
    Xu, Zichuan
    Liang, Weifa
    9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2012), 2012, : 443 - 447
  • [38] Collusion-resistant, Incentive-compatible Feedback Payments
    Jurca, Radu
    Faltings, Boi
    EC'07: PROCEEDINGS OF THE EIGHTH ANNUAL CONFERENCE ON ELECTRONIC COMMERCE, 2007, : 200 - 209
  • [39] COLLUSION-RESISTANT VIDEO FINGERPRINTING BASED ON TEMPORAL OSCILLATION
    Lin, Yu-Tzu
    Huang, Chun-Hsiang
    Wu, Ja-Ling
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 3128 - 3131
  • [40] An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
    Peter Kieseberg
    Sebastian Schrittwieser
    Martin Mulazzani
    Isao Echizen
    Edgar Weippl
    Electronic Markets, 2014, 24 : 113 - 124