Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

被引:1
|
作者
Song, Beibei [1 ]
Zhou, Dehua [2 ]
Wu, Jiahe [1 ]
Yuan, Xiaowei [1 ]
Zhu, Yiming [1 ]
Wang, Chuansheng [2 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Guangzhou 511436, Peoples R China
[2] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
来源
FUTURE INTERNET | 2023年 / 15卷 / 04期
基金
中国国家自然科学基金;
关键词
outsourcing computation; function privacy; input privacy; publicly verifiable computation; homomorphic encryption; proxy re-encryption; KEY CRYPTOSYSTEM; ENCRYPTION; DELEGATION; SECURITY;
D O I
10.3390/fi15040152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing the computation of functions, a function owner delegates a cloud server to perform the function's computation on the input received from the user. There are three primary security concerns associated with this process: protecting function privacy for the function owner, protecting input privacy for the user and guaranteeing that the cloud server performs the computation correctly. Existing works have only addressed privately verifiable outsourcing computation with privacy or publicly verifiable outsourcing computation without input privacy or function privacy. By using the technologies of homomorphic encryption, proxy re-encryption and verifiable computation, we propose the first publicly verifiable outsourcing computation scheme that achieves both input privacy and function privacy for matrix functions, which can be extended to arbitrary multivariate polynomial functions. We additionally provide a faster privately verifiable method. Moreover, the function owner retains control over the function.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] An Improved Protocol for Verifiable Polynomial Cloud Outsourcing Computation
    Ye, Jun
    Yang, Zewen
    An, Fanglin
    Zhang, Yin
    Zhao, Kejie
    Wang, Hongqi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [22] Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees
    Tsaloli, Georgia
    Mitrokotsa, Aikaterini
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 425 - 430
  • [23] A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts
    Wang, Hao
    Ge, Chunpeng
    Zhou, Lu
    Liu, Zhe
    Lan, Dongwan
    Lu, Xiaozhen
    Jiang, Danni
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 70 - 83
  • [24] Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Chen, Xiaofeng
    Huang, Xinyi
    Chen, Jiageng
    Zhang, Mingwu
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 417 - 430
  • [25] Protecting Access Pattern Privacy in Database Outsourcing Service
    Hue, T. B. P.
    Thuc, D. N.
    Thuy, T. B. D.
    Echizen, I.
    Wohlgemuth, S.
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 922 - 928
  • [26] A privacy-preserving publicly verifiable quantum random number generator
    Islam, Tanvirul
    Banerji, Anindya
    Boon, Chin Jia
    Rui, Wang
    Reezwana, Ayesha
    Grieve, James A.
    Piera, Rodrigo
    Ling, Alexander
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [27] Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy
    Peng, Kun
    Bao, Feng
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 118 - 132
  • [28] Publicly verifiable privacy-preserving aggregation and its application in IoT
    Li, Tong
    Gao, Chongzhi
    Jiang, Liaoliang
    Pedrycz, Witold
    Shen, Jian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 : 39 - 44
  • [29] Privacy-preserving Revocation of Verifiable Credentials with Verifiable Random Functions
    Papathanasiou, Athanasia Maria
    Polyzos, George C.
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 391 - 394
  • [30] Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework
    Liu, Jiao
    Li, Xinghua
    Liu, Ximeng
    Tang, Jiawei
    Wang, Yunwei
    Tong, Qiuyun
    Ma, Jianfeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4591 - 4604