Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

被引:1
|
作者
Song, Beibei [1 ]
Zhou, Dehua [2 ]
Wu, Jiahe [1 ]
Yuan, Xiaowei [1 ]
Zhu, Yiming [1 ]
Wang, Chuansheng [2 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Guangzhou 511436, Peoples R China
[2] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
来源
FUTURE INTERNET | 2023年 / 15卷 / 04期
基金
中国国家自然科学基金;
关键词
outsourcing computation; function privacy; input privacy; publicly verifiable computation; homomorphic encryption; proxy re-encryption; KEY CRYPTOSYSTEM; ENCRYPTION; DELEGATION; SECURITY;
D O I
10.3390/fi15040152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing the computation of functions, a function owner delegates a cloud server to perform the function's computation on the input received from the user. There are three primary security concerns associated with this process: protecting function privacy for the function owner, protecting input privacy for the user and guaranteeing that the cloud server performs the computation correctly. Existing works have only addressed privately verifiable outsourcing computation with privacy or publicly verifiable outsourcing computation without input privacy or function privacy. By using the technologies of homomorphic encryption, proxy re-encryption and verifiable computation, we propose the first publicly verifiable outsourcing computation scheme that achieves both input privacy and function privacy for matrix functions, which can be extended to arbitrary multivariate polynomial functions. We additionally provide a faster privately verifiable method. Moreover, the function owner retains control over the function.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] Privacy-preserving and Verifiable Outsourcing Inference Against Malicious Servers
    Liu, Yiyao
    Li, Hongwei
    Hao, Meng
    Zhang, Xilin
    Hu, Guiqiang
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5001 - 5006
  • [32] Function Computation with Privacy Constraints
    Tu, Wenwen
    Lai, Lifeng
    2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 1672 - 1676
  • [33] On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation
    Zhao, Liang
    Chen, Liqun
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1296 - 1298
  • [34] Verifiable outsourcing computation for modular exponentiation from shareable functions
    Liu M.
    Wu Y.
    Xue R.
    Zhang R.
    Liu, Muhua (lxk0379@126.com), 1600, Springer (23): : 43 - 55
  • [35] Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy
    Luo, Zhilong
    Sun, Shi-Feng
    Wang, Zhedong
    Gu, Dawu
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 281 - 302
  • [36] Privacy preserving, verifiable and efficient outsourcing algorithm for regression analysis to a malicious cloud
    Kumar, Malay
    Meena, Jasraj
    Tiwari, Shailesh
    Vardhan, Manu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (05) : 3413 - 3427
  • [37] Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT
    Li, Hongjun
    Kong, Fanyu
    Yu, Jia
    Zhang, Hanlin
    Diao, Luhong
    Tao, Yunting
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 556 - 564
  • [38] On Function Computation With Privacy and Secrecy Constraints
    Tu, Wenwen
    Lai, Lifeng
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (10) : 6716 - 6733
  • [39] Functional Privacy for Distributed Function Computation
    Lu, Jian
    Xu, Yinfei
    Shao, Shuo
    2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, : 1 - 6
  • [40] On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation
    Zhao, Liang
    Yu, Jie
    Zhang, Yiheng
    Chen, Liqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4299 - 4301