Verifiable Computation on Outsourced Encrypted Data

被引:0
|
作者
Lai, Junzuo [1 ,2 ]
Deng, Robert H. [3 ]
Pang, Hweehwa [3 ]
Weng, Jian [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Beijing, Peoples R China
[3] Natl Univ Singapore, Sch Informat Syst, Singapore Management, Singapore 178902, Singapore
来源
基金
高等学校博士学科点专项科研基金; 美国国家科学基金会; 中国国家自然科学基金;
关键词
Cloud Computing; Outsourced Encrypted Data; Verifiable Homomorphic Encryption; FULLY HOMOMORPHIC ENCRYPTION; DELEGATION; PROOFS; KEY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authenticator, such as homomorphic signature with public verifiability and homomorphic MAC with private verifiability, guarantees authenticity of computation over outsourced data but does not provide data confidentiality. Since cloud servers are usually operated by third-party providers which are almost certain to be outside the trust domain of cloud users, neither homomorphic encryption nor homomorphic authenticator suffices for verifiable computation on outsourced encrypted data in the cloud. In this paper, we propose verifiable homomorphic encryption (VHE), which enables verifiable computation on outsourced encrypted data. We first introduce a new cryptographic primitive called homomorphic encrypted authenticator (HEA), which may be of independent interest. Informally, HEA can be viewed as a homomorphic authenticator in which the authenticator itself does not leak any information about the message it authenticates. Next, we show that the fully homomorphic MAC scheme, proposed by Gennaro and Wichs recently, is a fully HEA with weak unforgeability in the sense that an adversary is not allowed to make verification queries. We then propose a linearly HEA which can tolerate any number of malicious verification queries, i.e., it achieves (strong) unforgeability. Finally, we define VHE formally, and give a generic construction of VHE based on homomorphic encryption and HEA. Instantiating the generic construction, we derive a fully VHE with weak verifiability as well as a linearly VHE with (strong) verifiability.
引用
收藏
页码:273 / 291
页数:19
相关论文
共 50 条
  • [41] Constructing Private Indexes on Encrypted Data for Outsourced Databases
    Tang, Yi
    Zhang, Ji
    Zhang, Xiaolei
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 71 - 85
  • [42] Encrypted Scalar Product Protocol for Outsourced Data Mining
    Liu, Fang
    Ng, Wee Keong
    Zhang, Wei
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 336 - 343
  • [43] Constructing private indexes on encrypted data for outsourced databases
    [J]. Tang, Yi, 1600, Springer Verlag (8860):
  • [44] Encrypted Association Rule Mining for Outsourced Data Mining
    Liu, Fang
    Ng, Wee Keong
    Zhang, Wei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 550 - 557
  • [45] Selective Sharing of Outsourced Encrypted Data in Cloud Environments
    Sifah, Emmanuel Boateng
    Xia, Qi
    Xia, Hu
    Agyekum, Kwame Opuni-Boachie Obour
    Acheampong, Kingsley Nketia
    Cobblah, Christian Nii Aflah
    Gao, Jianbin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (18) : 14141 - 14155
  • [46] Encrypted Gradient Descent Protocol for Outsourced Data Mining
    Liu, Fang
    Ng, Wee Keong
    Zhang, Wei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 339 - 346
  • [47] Privacy-Preserving GWAS Computation on Outsourced Data Encrypted under Multiple Keys Through Hybrid System
    Bomai, Abubakar
    Aldeen, Mohammed Shujaa
    Zhao, Chuan
    [J]. 2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 683 - 691
  • [48] Publicly Verifiable Grouped Aggregation Queries on Outsourced Data Streams
    Nath, Suman
    Venkatesan, Ramarathnam
    [J]. 2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 517 - 528
  • [49] Enabling Verifiable and Dynamic Ranked Search over Outsourced Data
    Liu, Qin
    Tian, Yue
    Wu, Jie
    Peng, Tao
    Wang, Guojun
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 69 - 82
  • [50] IoT data security in outsourced databases: A survey of verifiable database
    Chen, Ailin
    Yu, Shaoyuan
    Yang, Xinyi
    Huang, Ding
    Ren, Yongjun
    [J]. HELIYON, 2024, 10 (07)