Proxy Re-Encryption Based on Homomorphic Encryption

被引:11
作者
Bellafqira, Reda [1 ]
Coatrieux, Gouenou [1 ]
Bouslimi, Dalel [1 ]
Quellec, Gwenole [2 ]
Cozic, Michel [3 ]
机构
[1] IMT Atlantique, Brest, France
[2] INSERM, Brest, France
[3] MED e COM, Plougastel Daoulas, France
来源
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017) | 2017年
关键词
Security confidentiality; Processing of encrypted data; Homomorphic proxy re-encryption; CRYPTOSYSTEM;
D O I
10.1145/3134600.3134616
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an homomorphic proxy re-encryption scheme (HPRE) that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility by next to process such data remotely. Its originality stands on a solution we propose so as to compute the difference of data encrypted with Damgard-Jurik cryptosystem. It takes also advantage of a secure combined linear congruential generator that we implemented in the Damgard-Jurik encrypted domain. Basically, in our HPRE scheme, the two users, the delegator and the delegate, ask the cloud server to generate an encrypted noise based on a secret key, both users previously agreed on. Based on our solution to compute the difference in Damgard-Jurik encrypted domain, the cloud computes in clear the differences in-between the encrypted noise and the encrypted data of the delegator, obtaining thus blinded data. In order the delegate gets access to the data, the cloud just has to encrypt these differences using the delegate's public key and then removes the noise. This solution doesn't need extra communication between the cloud and the delegator. Our HPRE was implemented in the case of the sharing of uncompressed images stored in the cloud showing good time computation performance, it is unidirectional and collusion-resistant. Nevertheless, it is not limited to images and can be used with any kinds of data.
引用
收藏
页码:154 / 161
页数:8
相关论文
共 26 条
[1]  
[Anonymous], 1978, FDN SEC COMPUT
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
[4]  
Bellafqira R, 2016, IEEE ENG MED BIO, P2537, DOI 10.1109/EMBC.2016.7591247
[5]  
Bellafqira R, 2015, IEEE ENG MED BIO, P2944, DOI 10.1109/EMBC.2015.7319009
[6]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]  
Bouslimi D, 2016, IEEE ENG MED BIO, P2496, DOI 10.1109/EMBC.2016.7591237
[8]  
Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
[9]  
Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
[10]  
Damgård I, 2003, LECT NOTES COMPUT SC, V2727, P350