One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing

被引:15
|
作者
Xie, Dong [1 ,2 ,3 ]
Chen, Fulong [1 ,3 ]
Luo, Yonglong [1 ,3 ]
Li, Lixiang [2 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu 241002, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Anhui Normal Univ, Anhui Prov Key Lab Network & Informat Secur, Wuhu 241002, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Compressed sensing; One-to-many encryption; Privacy-preserving; Outsourced decryption; RESTRICTED ISOMETRY PROPERTY;
D O I
10.1016/j.dsp.2019.102587
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a classical framework for signal compression and reconstruction, compressed sensing (CS) has dramatically improved the state-of-the-art in many fields such as image processing, wireless communication, medical imaging and optics. Since CS integrates data compression and encryption, CS-based cryptographic primitives have attracted great attention in recent years. Note that almost all the existing CS-based encryption schemes are one-to-one symmetric cryptosystems. Unlike traditional permutation-diffusion based symmetric cryptosystems (e.g., DES and AES), CS-based encryption schemes do not have the characteristic of high efficiency because decryption procedures require to perform complex and time-consuming reconstruction algorithms. In this paper, we break the traditional one-to-one encryption framework of CS-based cryptosystems, and present an efficient one-to-many encryption model for flexible application scenarios. Specifically, the information sender first encrypts several plaintext images simultaneously for different users according to our proposed attribute-based key distribution mechanism, and then sends the ciphertext to the cloud storage server. Any user who has one of attributes can efficiently obtain the corresponding plaintext by using an outsourced decryption server (ODS). To prevent the ODS from stealing the plaintexts for illegal activities, we employ a homomorphic transformation algorithm which can transform the original reconstruction problem into a variant one. The experimental results and the comparison with similar works demonstrate the feasibility and the superiority of the proposed scheme. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Labeled Homomorphic Encryption Scalable and Privacy-Preserving Processing of Outsourced Data
    Barbosa, Manuel
    Catalano, Dario
    Fiore, Dario
    COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 146 - 166
  • [2] Privacy-Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption
    Yu, Xiaopeng
    Zhao, Wei
    Huang, Yunfan
    Ren, Juan
    Tang, Dianhua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [3] Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption
    Wang, Chen
    Xu, Jian
    Li, Jiarun
    Dong, Yan
    Naik, Nitin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02): : 1421 - 1436
  • [4] Privacy-preserving Compressed Sensing for Image Simultaneous Compression-encryption Applications
    Zhang, Bo
    Xiao, Di
    Wang, Mengdi
    Liang, Jia
    2021 DATA COMPRESSION CONFERENCE (DCC 2021), 2021, : 283 - 292
  • [5] Privacy-Preserving Swarm Learning Based on Homomorphic Encryption
    Chen, Lijie
    Fu, Shaojing
    Lin, Liu
    Luo, Yuchuan
    Zhao, Wentao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 509 - 523
  • [6] ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications
    Bozdemir, Beyza
    Ermis, Orhan
    Onen, Melek
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 397 - 404
  • [7] Privacy-Preserving Collective Learning With Homomorphic Encryption
    Paul, Jestine
    Annamalai, Meenatchi Sundaram Muthu Selva
    Ming, William
    Al Badawi, Ahmad
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    IEEE ACCESS, 2021, 9 : 132084 - 132096
  • [8] A privacy-preserving parallel and homomorphic encryption scheme
    Min, Zhaoe
    Yang, Geng
    Shi, Jingqi
    OPEN PHYSICS, 2017, 15 (01): : 135 - 142
  • [9] A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
    Yang, Wencheng
    Wang, Song
    Cui, Hui
    Tang, Zhaohui
    Li, Yan
    SENSORS, 2023, 23 (07)
  • [10] Privacy-preserving inpainting for outsourced image
    Cao, Fang
    Sun, Jiayi
    Luo, Xiangyang
    Qin, Chuan
    Chang, Ching-Chun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (11)