Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

被引:1
|
作者
Song, Beibei [1 ]
Zhou, Dehua [2 ]
Wu, Jiahe [1 ]
Yuan, Xiaowei [1 ]
Zhu, Yiming [1 ]
Wang, Chuansheng [2 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Guangzhou 511436, Peoples R China
[2] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
来源
FUTURE INTERNET | 2023年 / 15卷 / 04期
基金
中国国家自然科学基金;
关键词
outsourcing computation; function privacy; input privacy; publicly verifiable computation; homomorphic encryption; proxy re-encryption; KEY CRYPTOSYSTEM; ENCRYPTION; DELEGATION; SECURITY;
D O I
10.3390/fi15040152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing the computation of functions, a function owner delegates a cloud server to perform the function's computation on the input received from the user. There are three primary security concerns associated with this process: protecting function privacy for the function owner, protecting input privacy for the user and guaranteeing that the cloud server performs the computation correctly. Existing works have only addressed privately verifiable outsourcing computation with privacy or publicly verifiable outsourcing computation without input privacy or function privacy. By using the technologies of homomorphic encryption, proxy re-encryption and verifiable computation, we propose the first publicly verifiable outsourcing computation scheme that achieves both input privacy and function privacy for matrix functions, which can be extended to arbitrary multivariate polynomial functions. We additionally provide a faster privately verifiable method. Moreover, the function owner retains control over the function.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
    Liang Feng Zhang
    Reihaneh Safavi-Naini
    Designs, Codes and Cryptography, 2020, 88 : 677 - 709
  • [2] Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (04) : 677 - 709
  • [3] Publicly Verifiable Auctions with Privacy
    Germouty, Paul
    Larraia, Enrique
    Zhang, Wei
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2023 INTERNATIONAL WORKSHOPS, FC 2023, 2024, 13953 : 420 - 438
  • [4] Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Schoenmakers, Berry
    Veeningen, Meilof
    de Vreede, Niels
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 346 - 366
  • [5] Robust, privacy protecting and publicly verifiable sealed-bid auction
    Peng, K
    Boyd, C
    Dawson, E
    Viswanathan, K
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 147 - 159
  • [6] EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation
    Xu, Chang
    Rao, Hongzhou
    Zhu, Liehuang
    Zhang, Chuan
    Sharif, Kashif
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 7007 - 7022
  • [7] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [8] Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud
    Xie, Dawei
    Yang, Haining
    Qin, Jing
    Ma, Jixin
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (04) : 14 - 27
  • [9] Privacy-preserving verifiable delegation of polynomial and matrix functions
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 153 - 171
  • [10] Privacy-Preserving Publicly Verifiable Databases
    Wang, Qiang
    Zhou, Fucai
    Zhou, Boyang
    Xu, Jian
    Chen, Chunyu
    Wang, Qi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1639 - 1654