Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database

被引:12
作者
Yang, Haining [1 ]
Su, Ye [1 ]
Qin, Jing [1 ,2 ]
Wang, Huaxiong [3 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
Servers; Encryption; Data privacy; Cloud computing; Privacy; Computational modeling; Verifiable computation; outsourced encrypted database; inner product; FUNCTIONAL ENCRYPTION;
D O I
10.1109/TDSC.2020.3001345
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We consider an outsourced computation model in the selective data sharing setting. Specifically, one of the data owners outsources the encrypted data to an untrusted cloud server, and wants to share the specific function of these data with a group of data users. A data user can perform the specific computation on the data that it is authorized to access. We propose a construction under this model for the inner product computation by using the Inner Product Functional Encryption (IPFE) as a building block. A standard IPFE used on this model has two privacy weaknesses regarding the master secret key and the encrypted vector. We propose a strengthened IPFE that revises these weaknesses. We construct a new IPFE scheme and use it to construct an efficient outsourced inner product computation scheme. In our outsourced computation scheme, the storage overhead and the computation cost for a data user are independent of the vector size. The result privacy and the outsourced data privacy are well preserved against the untrusted cloud server. The experimental results show that our schemes are efficient and practical.
引用
收藏
页码:1320 / 1337
页数:18
相关论文
共 39 条
[1]  
Abdalla M., 2016, Paper 2016/011, V2016
[2]  
Abdalla M, 2019, LECT NOTES COMPUT SC, V11443, P128, DOI 10.1007/978-3-030-17259-6_5
[3]   Simple Functional Encryption Schemes for Inner Products [J].
Abdalla, Michel ;
Bourse, Florian ;
De Caro, Angelo ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :733-751
[4]   Fully Secure Functional Encryption for Inner Products, from Standard Assumptions [J].
Agrawal, Shweta ;
Libert, Benoit ;
Stehle, Damien .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :333-362
[5]  
Alderman J., 2015, P 10 ACM S INF COMP, P657
[6]   Hybrid Publicly Verifiable Computation [J].
Alderman, James ;
Janson, Christian ;
Cid, Carlos ;
Crampton, Jason .
TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 :147-163
[7]  
Barbosa Manuel, 2019, Topics in Cryptology - CT-RSA 2019. The Cryptographers Track at the RSA Conference 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11405), P127, DOI 10.1007/978-3-030-12612-4_7
[8]  
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[9]   CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions [J].
Benhamouda, Fabrice ;
Bourse, Florian ;
Lipmaa, Helger .
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 :36-66
[10]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16