Secure and collusion-resistant data aggregation from convertible tags

被引:3
|
作者
Leontiadis, Iraklis [1 ,2 ]
Li, Ming [3 ]
机构
[1] Inpher, New York, NY 10010 USA
[2] Inpher, Lausanne, Switzerland
[3] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
关键词
Data privacy; Data security; Convertible tags; Collusion-resistant aggregation; FAULT-TOLERANCE;
D O I
10.1007/s10207-019-00485-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The progress in communication and hardware technology increases the computational capabilities of personal devices. Aggregators, acting as third parties, are interested in learning a statistical function as the sum over a census of data. Users are reluctant to reveal their information in cleartext, since it is treated as personal sensitive information. The paradoxical paradigm of preserving the privacy of individual data while granting an untrusted third party to learn in cleartext a function thereof, is partially addressed by the current privacy-preserving aggregation protocols. Current solutions are either focused on an honest-but-curious Aggregator who is trusted to follow the rules of the protocol or model a malicious Aggregator with trustworthy users. In this paper, we are the first to propose a protocol with fully malicious users who collude with a malicious Aggregator in order to forge a message of a trusted user. We introduce the new cryptographic primitive of convertible tag, that consists of a two-layer authentication tag. Users first tag their data with their secret key and then an untrusted Converter converts the first layer tags in a second layer. The final tags allow the Aggregator to produce a proof for the correctness of a computation over users' data. Security and privacy of the scheme is preserved against the Converter and the Aggregator, under the notions of Aggregator obliviousness and Aggregate unforgeability security definitions, augmented with malicious users. Our protocol is provably secure, and experimental evaluations demonstrate its practicality.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [41] Functional Re-encryption and Collusion-Resistant Obfuscation
    Chandran, Nishanth
    Chase, Melissa
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 404 - 421
  • [42] Collusion-Resistant Mechanisms for Single-Parameter Agents
    Goldberg, Andrew V.
    Hartline, Jason D.
    PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2005, : 620 - 629
  • [43] Collusion-resistant video fingerprinting for large user group
    He, Shan
    Wu, Min
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (04) : 697 - 709
  • [44] Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
    Penna, Paolo
    Ventre, Carmine
    ACM TRANSACTIONS ON COMPUTATION THEORY, 2012, 4 (02)
  • [45] AudiWFlow: Confidential, collusion-resistant auditing of distributed workflows
    Zhou, Xiaohu
    Nehme, Antonio
    Jesus, Vitor
    Wang, Yonghao
    Josephs, Mark
    Mahbub, Khaled
    Abdallah, Ali
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2022, 3 (03):
  • [46] Collusion-resistant video watermarking based on video mosaicing
    Koubaa, M.
    Amar, C. Ben
    Nicolas, H.
    ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 161 - 166
  • [47] Collusion-Resistant Unidirectional Proxy Re-Encryption Scheme from Lattices
    Kim, Kee Sung
    Jeong, Ik Rae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (01) : 1 - 7
  • [48] Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data
    Zhu, Youwen
    Takagi, Tsuyoshi
    Hu, Rong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 326 - 330
  • [49] A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
    Yang, Nan
    Tian, Youliang
    Zhou, Zhou
    Zhang, Qijia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [50] Collusion-resistant dynamic spectrum resource renting and offering mechanism
    Liu, Ying-Ting
    Liu, Xin
    Li, Zan
    Zhang, Hai-Lin
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2011, 41 (05): : 1497 - 1502