A coding computation scheme for secure aggregation

被引:0
|
作者
Yang, Ze
Tian, Youliang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
基金
中国国家自然科学基金;
关键词
Data aggregation; Coding theory; Chinese Residual Theorem (CRT); Privacy preservation;
D O I
10.1016/j.jksuci.2024.102073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic requirements for data aggregation involving private data, how to achieve fault tolerance and interference of aggregation in real computing networks is imminent and is the main contribution of this paper. In this paper, we propose a secure aggregation framework involving multiple servers based on coding theory, which is not only robust to clients dropping out and tolerant to partial server withdrawal but also resistant to malicious computation by servers and forgery attacks by adversaries. In particular, the proposed protocol employs the Chinese Residual Theorem (CRT) to encode private data and constructs Lagrange interpolation polynomials to perform aggregation, which achieves lightweight privacy preservation while achieving robust, verifiable and secure aggregation goals.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] A Novel Secure and Efficient Data Aggregation Scheme for IoT
    Li, Ruinian
    Sturtivant, Carl
    Yu, Jiguo
    Cheng, Xiuzhen
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1551 - 1560
  • [22] Homomorphic Subspace MAC Scheme for Secure Network Coding
    Liu, Guangjun
    Wang, Xiao
    ETRI JOURNAL, 2013, 35 (01) : 173 - 176
  • [23] A secure quantum network coding scheme with identity authentication
    Shang, Tao, 1600, American Scientific Publishers (12):
  • [24] A Lightweight Secure Network Coding Scheme against Wiretapping
    LIU Guangjun
    LIU Ximeng
    XIONG Jinbo
    ZHOU Hang
    WuhanUniversityJournalofNaturalSciences, 2014, 19 (02) : 156 - 160
  • [25] How to Construct Strongly Secure Network Coding Scheme
    Kurosawa, Kaoru
    Ohta, Hiroyuki
    Kakuta, Kenji
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 1 - 17
  • [26] Secure network coding scheme for scalable video streaming
    Liu, X.-M., 1600, Editorial Board of Journal on Communications (34):
  • [27] Secure Multiparty Computation via Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Wang, Zhao-Li
    Shi, Ya-Qing
    Wang, Mei-Juan
    Dong, Hui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 250 - 253
  • [28] A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs
    Kumar, Vimal
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 102 - 107
  • [29] RESA: A Robust and Efficient Secure Aggregation Scheme in Smart Grids
    Sui, Zhiyuan
    Niedermeier, Michael
    de Meer, Hermann
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 171 - 182
  • [30] SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme
    Shafeeq, Sehrish
    Fischer, Mathias
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 369 - 376