Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

被引:1
|
作者
Song, Beibei [1 ]
Zhou, Dehua [2 ]
Wu, Jiahe [1 ]
Yuan, Xiaowei [1 ]
Zhu, Yiming [1 ]
Wang, Chuansheng [2 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Guangzhou 511436, Peoples R China
[2] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
来源
FUTURE INTERNET | 2023年 / 15卷 / 04期
基金
中国国家自然科学基金;
关键词
outsourcing computation; function privacy; input privacy; publicly verifiable computation; homomorphic encryption; proxy re-encryption; KEY CRYPTOSYSTEM; ENCRYPTION; DELEGATION; SECURITY;
D O I
10.3390/fi15040152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing the computation of functions, a function owner delegates a cloud server to perform the function's computation on the input received from the user. There are three primary security concerns associated with this process: protecting function privacy for the function owner, protecting input privacy for the user and guaranteeing that the cloud server performs the computation correctly. Existing works have only addressed privately verifiable outsourcing computation with privacy or publicly verifiable outsourcing computation without input privacy or function privacy. By using the technologies of homomorphic encryption, proxy re-encryption and verifiable computation, we propose the first publicly verifiable outsourcing computation scheme that achieves both input privacy and function privacy for matrix functions, which can be extended to arbitrary multivariate polynomial functions. We additionally provide a faster privately verifiable method. Moreover, the function owner retains control over the function.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited
    Zhao, Liang
    Chen, Liqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3671 - 3687
  • [42] User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption
    Sheng, Luo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [43] PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting
    Zhou, Jun
    Choo, Kim-Kwang Raymond
    Cao, Zhenfu
    Dong, Xiaolei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2253 - 2270
  • [44] Fast privacy-preserving network function outsourcing
    Asghar, Hassan Jameel
    De Cristofaro, Emiliano
    Jourjon, Guillaume
    Kaafar, Mohammed Ali
    Mathy, Laurent
    Melis, Luca
    Russell, Craig
    Yu, Mang
    COMPUTER NETWORKS, 2019, 163
  • [45] Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain
    Zhang, Yonghong
    Zheng, Peijia
    Luo, Weiqi
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 389 - 396
  • [46] Publicly Verifiable Outsourcing Computation for Inner Product Evaluation under Multiple Keys with Improved Security and Efficiency
    Du, Zhiqiang
    Zheng, Dong
    Zhao, Qinglan
    International Journal of Network Security, 2022, 24 (01) : 92 - 103
  • [47] Public Verifiable Privacy-Preserving Multi-Party Computation on Blockchain
    Zhang, Ziyan
    Chen, Liquan
    Jiang, Xinzao
    Yang, Bo
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 531 - 537
  • [48] Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems
    Toreini, Ehsan
    Mehrnezhad, Maryam
    van Moorsel, Aad
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 569 - 584
  • [49] Protecting business intelligence and customer privacy while outsourcing data mining tasks
    Ling Qiu
    Yingjiu Li
    Xintao Wu
    Knowledge and Information Systems, 2008, 17 : 99 - 120
  • [50] Protecting business intelligence and customer privacy while outsourcing data mining tasks
    Qiu, Ling
    Li, Yingjiu
    Wu, Xintao
    KNOWLEDGE AND INFORMATION SYSTEMS, 2008, 17 (01) : 99 - 120