Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing

被引:17
作者
El Makkaoui, Khalid [1 ]
Beni-Hssane, Abderrahim [2 ]
Ezzati, Abdellah [1 ]
机构
[1] Univ Hassan 1, FST, LAVETE Lab, BP 577, Settat 26000, Morocco
[2] Chouaib Doukkali Univ, Sci Fac, Comp Sci Dept, LAROSERI Lab, El Jadida, Morocco
关键词
Cloud computing; Confidentiality; Homomorphic encryption (HE); Fast decryption; Chinese remainder theorem (CRT); Hensel lifting; ENCRYPTION; CRYPTANALYSIS; CRYPTOSYSTEM; ATTACKS;
D O I
10.1007/s12652-018-0844-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Homomorphic encryption (HE) technique provides a third party with the ability to execute operations on ciphertexts. This property can be considered as a good solution to overcome some barriers limiting the widespread adoption of cloud services. However, since cloud environments are more threatened by security attacks and since cloud consumers often access to cloud services using resource-constrained devices, the HE schemes have to be promoted at security level and at running time to work efficiently. In El Makkaoui et al. (Cloud-RSA: an enhanced homomorphic encryption scheme. In: Rocha A, Serrhini M, Felgueiras C (eds) Europe and MENA cooperation advances in information and communication technologies. Advances in intelligent systems and computing, vol 520. Springer, Cham, pp 471-480, 2017b), we boosted RSA scheme at security level, Cloud-RSA. In this paper, we suggest two variants of Cloud-RSA scheme in order to speed up its decryption process. The variants are based on modifying the form of Cloud-RSA modulus and exponents. The first variant uses a modulus formed of two or more distinct primes and employs the Chinese remainder theorem (CRT) to encrypt and decrypt. Whereas, the second variant uses a modulus of the form n = p(r)q(s) for r >= 2 and s >= 1, and applies the Hensel lifting and the CRT to decrypt. Theoretical and simulation results show that the proposed variants provide a large decryption speedup over Cloud-RSA.
引用
收藏
页码:4629 / 4640
页数:12
相关论文
共 37 条
  • [1] Garbled role-based access control in the cloud
    Alam, Masoom
    Emmanuel, Naina
    Khan, Tanveer
    Xiang, Yang
    Hassan, Houcine
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1153 - 1166
  • [2] [Anonymous], 2016 INT C BIG DAT A
  • [3] [Anonymous], 2009, CLOUDS BERKELEY VIEW
  • [4] [Anonymous], 1993, DEV NUMBER FIELD SIE
  • [5] [Anonymous], 1978, FDN SEC COMPUT
  • [6] An Overview of the State-of-the-Art of Cloud Computing Cyber-Security
    Bennasar, H.
    Bendahmane, A.
    Essaaidi, M.
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 56 - 67
  • [7] Bleichenbacher D, 2006, LECT NOTES COMPUT SC, V3958, P1
  • [8] Cryptanalysis of RSA with private key d less than N0.292
    Boneh, D
    Durfee, G
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1339 - 1349
  • [9] BONEH D., 2002, CRYPTOBYTES, V5, P1
  • [10] Cheon JH, 2013, LECT NOTES COMPUT SC, V7881, P315, DOI 10.1007/978-3-642-38348-9_20