Affiliation:
1. College of Cyber Security, Jinan University, Guangzhou 511436, China
2. College of Information Science and Technology, Jinan University, Guangzhou 510632, China
Abstract
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing the computation of functions, a function owner delegates a cloud server to perform the function’s computation on the input received from the user. There are three primary security concerns associated with this process: protecting function privacy for the function owner, protecting input privacy for the user and guaranteeing that the cloud server performs the computation correctly. Existing works have only addressed privately verifiable outsourcing computation with privacy or publicly verifiable outsourcing computation without input privacy or function privacy. By using the technologies of homomorphic encryption, proxy re-encryption and verifiable computation, we propose the first publicly verifiable outsourcing computation scheme that achieves both input privacy and function privacy for matrix functions, which can be extended to arbitrary multivariate polynomial functions. We additionally provide a faster privately verifiable method. Moreover, the function owner retains control over the function.
Funder
National Natural Science Foundation of China
Guangdong Basic and Applied Basic Research Foundation
TESTBED2
Subject
Computer Networks and Communications
Reference33 articles.
1. On data banks and privacy homomorphisms;Rivest;Found. Secur. Comput.,1978
2. Mitzenmacher, M. (June, January 31). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA.
3. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages;Rogaway;Proceedings of the Advances in Cryptology—CRYPTO 2011—31st Annual Cryptology Conference,2011
4. Yao, C.C. (1986, January 27–29). How to generate and exchange secrets. Proceedings of the 27th Annual Symposium on Foundations of Computer Science, Toronto, ON, Canada.
5. Demmler, D., Schneider, T., and Zohner, M. (2015, January 8–11). ABY—A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. Proceedings of the 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, CA, USA.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献