A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains

被引:27
作者
Liu, Ximeng [1 ]
Qin, Baodong [2 ]
Deng, Robert H. [1 ]
Lu, Rongxing [3 ]
Ma, Jianfeng [4 ]
机构
[1] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[2] Southwest Univ Sci & Technol, Sch Comp Sci & Technol, Mianyang, Sichuan, Peoples R China
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, 50 Nanyang Ave, Singapore, Singapore
[4] Xidian Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Privacy-preserving; function privacy; homomorphic encryption; outsourced computation; large-scale; multiple encrypted domains; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.1109/TC.2016.2543220
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a framework for privacy-preserving outsourced functional computation across large-scale multiple encrypted domains, which we refer to as POFD. With POFD, a user can obtain the output of a function computed over encrypted data from multiple domains while protecting the privacy of the function itself, its input and its output. Specifically, we introduce two notions of POFD, the basic POFD and its enhanced version, in order to tradeoff the levels of privacy protection and performance. We present three protocols, named Multi-domain Secure Multiplication protocol (MSM), Secure Exponent Calculation protocol with private Base (SECB), and Secure Exponent Calculation protocol (SEC), as the core sub-protocols for POFD to securely compute the outsourced function. Detailed security analysis shows that the proposed POFD achieves the goal of calculating a user-defined function across different encrypted domains without privacy leakage to unauthorized parties. Our performance evaluations using simulations demonstrate the utility and the efficiency of POFD.
引用
收藏
页码:3567 / 3579
页数:13
相关论文
共 50 条
[1]  
[Anonymous], 1981, The Art of Computer Programming
[2]  
[Anonymous], 2011, ISTANBUL STOCK EXCHA
[3]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[4]  
Barker E., NIST Special Publication, V800-90C
[5]  
Baron Joshua, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P222, DOI 10.1007/978-3-642-32928-9_13
[6]  
Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
[7]  
Chamberlin B., 2014, LOT INTERNET THINGS
[8]  
Clarke J., 1994, Pieces of the puzzle: the jigsaw method. Penn State University, P120
[9]  
Coron JS, 2014, LECT NOTES COMPUT SC, V8383, P311, DOI 10.1007/978-3-642-54631-0_18
[10]  
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45