A coding computation scheme for secure aggregation

被引:0
|
作者
Yang, Ze
Tian, Youliang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
基金
中国国家自然科学基金;
关键词
Data aggregation; Coding theory; Chinese Residual Theorem (CRT); Privacy preservation;
D O I
10.1016/j.jksuci.2024.102073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic requirements for data aggregation involving private data, how to achieve fault tolerance and interference of aggregation in real computing networks is imminent and is the main contribution of this paper. In this paper, we propose a secure aggregation framework involving multiple servers based on coding theory, which is not only robust to clients dropping out and tolerant to partial server withdrawal but also resistant to malicious computation by servers and forgery attacks by adversaries. In particular, the proposed protocol employs the Chinese Residual Theorem (CRT) to encode private data and constructs Lagrange interpolation polynomials to perform aggregation, which achieves lightweight privacy preservation while achieving robust, verifiable and secure aggregation goals.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Novel secure image coding scheme using fractal transformation
    Alexandria Univ, Alexandria, Egypt
    Nat Radio Sci Conf NRSC Proc, (C23):
  • [42] A Novel Coding Scheme for Secure Communications in Distributed RFID Systems
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    Lai, Ten H.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (02) : 409 - 421
  • [43] A New Efficient and Secure POR Scheme Based on Network Coding
    Omote, Kazumasa
    Tran Phuong Thao
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 98 - 105
  • [44] An efficient MAC scheme for secure network coding with probabilistic detection
    Wang, Boyang
    Li, Hui
    Cao, Jin
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 429 - 441
  • [45] A Coding Scheme for Reliable In-Memory Hamming Distance Computation
    Chen, Zehui
    Schoeny, Clayton
    Cassuto, Yuval
    Dolecek, Lara
    2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 1713 - 1717
  • [46] CodedSketch: A Coding Scheme for Distributed Computation of Approximated Matrix Multiplication
    Jahani-Nezhad, Tayyebeh
    Maddah-Ali, Mohammad Ali
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (06) : 4185 - 4196
  • [47] An Electronic Voting Scheme Based On Secure Multi-Party Computation
    Gang, Cao
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 292 - 294
  • [48] A novel quantum scheme for secure two-party distance computation
    Zhen-wan Peng
    Run-hua Shi
    Hong Zhong
    Jie Cui
    Shun Zhang
    Quantum Information Processing, 2017, 16
  • [49] A secure and efficient outsourced computation on data sharing scheme for privacy computing
    Fan, Kai
    Liu, Tingting
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 169 - 176
  • [50] Fine Grained Key Computation Scheme for Secure Data Sharing in Cloud
    Polson, Deepa Maria
    Sabitha, S.
    Rajasree, M. S.
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1110 - 1116