Efficient Encrypted Data Comparison Through a Hybrid Method

被引:13
作者
Li, Xing-Xin [1 ]
Zhu, You-Wen [1 ]
Wang, Jian [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
关键词
secure comparison; cloud computing; homomorphic cryptosystem; garbled circuits; privacy preserving; SENSOR NETWORKS; PRIVACY; CITY;
D O I
10.6688/JISE.2017.33.4.6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of smart city, user data are all transformed in encrypted form to protect user privacy. Secure comparison in encrypted form is the fundamental operation of many secure encrypted data analysis tasks, such as secure k-NN query and classification, Bayesian classification. Thus, it is important to achieve an efficient secure encrypted data comparison scheme. Recently, some methods have been put forward to support secure comparison over encrypted data. Nevertheless, the existing solutions are still inefficient in practical. In this paper, we propose a novel encrypted data comparison protocol based on a hybrid approach of Paillier cryptosystem and garbled circuits. Our scheme reveals nothing about encrypted data and comparison result, and is provably secure under semi-honest model. Additionally, our proposed protocol can achieve higher efficiency, compared with the state-of-the-art scheme. Finally, we indicate the security and efficiency of our scheme by theoretical analysis and experiment evaluations.
引用
收藏
页码:953 / 964
页数:12
相关论文
共 31 条
  • [1] [Anonymous], 2011, PROC 20 USENIX SECUR
  • [2] Chun H., 2014, P 9 ACM S INFORM COM, P401, DOI DOI 10.1145/2590296.2590343
  • [3] Damgård I, 2007, LECT NOTES COMPUT SC, V4586, P416
  • [4] Damgard I, 2006, LECT NOTES COMPUT SC, V3876, P285
  • [5] Elmehdwi Y, 2014, PROC INT CONF DATA, P664, DOI 10.1109/ICDE.2014.6816690
  • [6] Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1053 - 1066
  • [7] Erkin Z, 2009, LECT NOTES COMPUT SC, V5672, P235, DOI 10.1007/978-3-642-03168-7_14
  • [8] Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
    Fu, Zhangjie
    Ren, Kui
    Shu, Jiangang
    Sun, Xingming
    Huang, Fengxiao
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) : 2546 - 2559
  • [9] Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
    Fu, Zhangjie
    Sun, Xingming
    Liu, Qi
    Zhou, Lu
    Shu, Jiangang
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) : 190 - 200
  • [10] Garay J, 2007, LECT NOTES COMPUT SC, V4450, P330