Enhancing Privacy Preservation in Verifiable Computation through Random Permutation Masking to Prevent Leakage

Author:

Yang Yang1,Song Guanghua1

Affiliation:

1. School of Information and Safety Engineering, Zhongnan University of Economics and Law, Wuhan 430073, China

Abstract

Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing (VC) has emerged as a secure approach, ensuring that the cloud cannot discern users’ input and output. Random permutation masking (RPM) is a widely adopted technique in VC protocols to provide robust privacy protection. This work presents a precise definition of the privacy-preserving property of RPM by employing indistinguishability experiments. Moreover, an innovative attack exploiting the greatest common divisor and the least common multiple of each row and column in the encrypted matrices is introduced against RPM. Unlike previous density-based attacks, this novel approach offers a significant advantage by allowing the reconstruction of matrix values from the ciphertext based on RPM. A comprehensive demonstration was provided to illustrate the failure of protocols based on RPM in maintaining the privacy-preserving property under this proposed attack. Furthermore, an extensive series of experiments is conducted to thoroughly validate the effectiveness and advantages of the attack against RPM. The findings of this research highlight vulnerabilities in RPM-based VC protocols and underline the pressing need for further enhancements and alternative privacy-preserving mechanisms in outsourcing computation.

Funder

Humanities and Social Sciences Research Project of the Chinese Ministry of Education

Graduate Education Reform Project of the Zhongnan University of Economics and Law

Publisher

MDPI AG

Subject

Information Systems

Reference39 articles.

1. Face identification based on singular value decomposition and data fusion;Wang;Chin. J. Comput.-Chin. Ed.,2000

2. Murphy, K.P. (2012). Machine Learning: A Probabilistic Perspective, MIT Press.

3. Elasticity in Cloud Computing: State of the Art and Research Challenges;Paraiso;IEEE Trans. Serv. Comput.,2018

4. Gennaro, R., Gentry, C., and Parno, B. (2010, January 15–19). Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Proceedings of the Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA. Proceedings 30.

5. Secure outsourcing of scientific computations;Atallah;Advances in Computers,2002

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3