Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing

被引:5
|
作者
Iwamura, Keiichi [1 ]
Kamal, Ahmad Akmal Aminuddin Mohd [2 ]
机构
[1] Tokyo Univ Sci, Dept Elect Engn, Tokyo 1258585, Japan
[2] Tokyo Univ Sci, Dept Informat & Comp Technol, Tokyo 1258585, Japan
关键词
Cloud computing security; data preprocessing; data privacy; high-speed computation; information security; multi-party computation; secure computation; threshold secret sharing; secure storage; FULLY HOMOMORPHIC ENCRYPTION; MULTIPARTY COMPUTATION; KEY;
D O I
10.1109/ACCESS.2023.3278995
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advancements in Internet of Things devices allow for the collection and analysis of big data. Moreover, cloud computing has emerged as an ideal platform for big data analysis because it quickly provides computing resources for analysis at scale. However, concerns exist regarding the privacy and security of this information. Secure computation is a technology that enables computation while maintaining data encryption. In this study, we present a new secure computation based on a client-server model, in which a set of servers perform computations using the inputs of multiple clients. We adopt the (k, n) threshold secret sharing approach, where an input s is divided into n shares and can be recovered from shares with a threshold k. However, conventional secure computation using (k, n) threshold secret sharing generally requires the condition n = 2k - 1 and communication among multiple servers for each multiplication. To the best of our knowledge, no previous study has solved this problem completely. We demonstrate that processes that require communication can be concentrated in the preprocessing phase and propose a secure computation using (k, n) threshold secret sharing that does not require communication during the secure computation phase, even when multiplication is performed. Moreover, we show that the number of communications does not depend on the number of multiplications, unlike in conventional methods. As communication often requires more processing time than the actual secure computation, our method makes it possible to realize faster overall processing than conventional methods. We also present an extensive security analysis and experimental simulation of the proposed method. Our proposed method achieves information-theoretic security against semi-honest adversaries under certain conditions with n < 2k - 1.
引用
收藏
页码:51166 / 51184
页数:19
相关论文
共 50 条
  • [21] Universal Communication Efficient Quantum Threshold Secret Sharing Schemes
    Senthoor, Kaushik
    Sarvepalli, Pradeep Kiran
    2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [22] Proactive (k, n) threshold secret sharing scheme with variant k and n
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Chen, Pin-You
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 117 - 120
  • [23] Fast Secure Computation Based on a Secret Sharing Scheme for n &lt; 2k-1
    Tokita, Kyohei
    Iwamura, Keiichi
    PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [24] Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication
    赖红
    Orgun A.Mehmet
    肖井华
    Pieprzyk Josef
    薛理银
    CommunicationsinTheoreticalPhysics, 2015, 63 (04) : 459 - 465
  • [25] Verifiable Threshold Secret Sharing and Full Fair Secure Two-party Computation
    Ye Jian-wei
    Jiao Xu-lu
    Zhang Yong-zheng
    AST: 2009 INTERNATIONAL E-CONFERENCE ON ADVANCED SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2009, : 78 - +
  • [26] Verifiable threshold secret sharing and full fair secure two-party computation
    School of Computer Science and Technology, Harbin Institute of Technology, Haerbin, China
    不详
    不详
    Proc. Int. e-Conf. Adv. Sci. Technol., AST, 1600, (78-83):
  • [27] Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n &lt; 2k-1 (short paper)
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 225 - 230
  • [28] Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
    Benhamouda, Fabrice
    Boyle, Elette
    Gilboa, Niv
    Halevi, Shai
    Ishai, Yuval
    Nof, Ariel
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT II, 2021, 13043 : 129 - 161
  • [29] An efficient (t,n)-threshold secret image sharing scheme
    Kanso, Ali
    Ghebleh, Mohammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16369 - 16388
  • [30] rPIR: ramp secret sharing-based communication-efficient private information retrieval
    Li, Lichun
    Militzer, Michael
    Datta, Anwitaman
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 603 - 625