Affiliation:
1. School of Information and Safety Engineering, Zhongnan University of Economics and Law, Wuhan 430073, China
Abstract
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing (VC) has emerged as a secure approach, ensuring that the cloud cannot discern users’ input and output. Random permutation masking (RPM) is a widely adopted technique in VC protocols to provide robust privacy protection. This work presents a precise definition of the privacy-preserving property of RPM by employing indistinguishability experiments. Moreover, an innovative attack exploiting the greatest common divisor and the least common multiple of each row and column in the encrypted matrices is introduced against RPM. Unlike previous density-based attacks, this novel approach offers a significant advantage by allowing the reconstruction of matrix values from the ciphertext based on RPM. A comprehensive demonstration was provided to illustrate the failure of protocols based on RPM in maintaining the privacy-preserving property under this proposed attack. Furthermore, an extensive series of experiments is conducted to thoroughly validate the effectiveness and advantages of the attack against RPM. The findings of this research highlight vulnerabilities in RPM-based VC protocols and underline the pressing need for further enhancements and alternative privacy-preserving mechanisms in outsourcing computation.
Funder
Humanities and Social Sciences Research Project of the Chinese Ministry of Education
Graduate Education Reform Project of the Zhongnan University of Economics and Law
Reference39 articles.
1. Face identification based on singular value decomposition and data fusion;Wang;Chin. J. Comput.-Chin. Ed.,2000
2. Murphy, K.P. (2012). Machine Learning: A Probabilistic Perspective, MIT Press.
3. Elasticity in Cloud Computing: State of the Art and Research Challenges;Paraiso;IEEE Trans. Serv. Comput.,2018
4. Gennaro, R., Gentry, C., and Parno, B. (2010, January 15–19). Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Proceedings of the Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA. Proceedings 30.
5. Secure outsourcing of scientific computations;Atallah;Advances in Computers,2002