Verifiable Computation on Outsourced Encrypted Data

被引:0
|
作者
Lai, Junzuo [1 ,2 ]
Deng, Robert H. [3 ]
Pang, Hweehwa [3 ]
Weng, Jian [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Beijing, Peoples R China
[3] Natl Univ Singapore, Sch Informat Syst, Singapore Management, Singapore 178902, Singapore
来源
基金
高等学校博士学科点专项科研基金; 美国国家科学基金会; 中国国家自然科学基金;
关键词
Cloud Computing; Outsourced Encrypted Data; Verifiable Homomorphic Encryption; FULLY HOMOMORPHIC ENCRYPTION; DELEGATION; PROOFS; KEY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authenticator, such as homomorphic signature with public verifiability and homomorphic MAC with private verifiability, guarantees authenticity of computation over outsourced data but does not provide data confidentiality. Since cloud servers are usually operated by third-party providers which are almost certain to be outside the trust domain of cloud users, neither homomorphic encryption nor homomorphic authenticator suffices for verifiable computation on outsourced encrypted data in the cloud. In this paper, we propose verifiable homomorphic encryption (VHE), which enables verifiable computation on outsourced encrypted data. We first introduce a new cryptographic primitive called homomorphic encrypted authenticator (HEA), which may be of independent interest. Informally, HEA can be viewed as a homomorphic authenticator in which the authenticator itself does not leak any information about the message it authenticates. Next, we show that the fully homomorphic MAC scheme, proposed by Gennaro and Wichs recently, is a fully HEA with weak unforgeability in the sense that an adversary is not allowed to make verification queries. We then propose a linearly HEA which can tolerate any number of malicious verification queries, i.e., it achieves (strong) unforgeability. Finally, we define VHE formally, and give a generic construction of VHE based on homomorphic encryption and HEA. Instantiating the generic construction, we derive a fully VHE with weak verifiability as well as a linearly VHE with (strong) verifiability.
引用
收藏
页码:273 / 291
页数:19
相关论文
共 50 条
  • [1] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    [J]. INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [2] Efficiently Verifiable Computation on Encrypted Data
    Fiore, Dario
    Gennaro, Rosario
    Pastro, Valerio
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 844 - 855
  • [3] Batch Verifiable Computation of Polynomials on Outsourced Data
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    [J]. COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 167 - 185
  • [4] Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
    Zheng, Qingji
    Xu, Shouhuai
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, : 175 - 184
  • [5] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [6] Verifiable Diversity Ranking Search Over Encrypted Outsourced Data
    Liu, Yuling
    Peng, Hua
    Wang, Jie
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01): : 37 - 57
  • [7] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 799 - 813
  • [8] SEVCOD: secure and efficient verifiable computation on outsourced data
    Chakraborty, Partha Sarathi
    Gavhane, Omkar Santosh
    Tripathy, Somanath
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4725 - 4739
  • [9] Verifiable Outsourced Computation: A Survey
    Gennaro, Rosario
    [J]. PROCEEDINGS OF THE ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'17), 2017, : 313 - 313
  • [10] Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks
    Hahn, Changhee
    Kim, Jongkil
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22559 - 22570