Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment

被引:0
|
作者
Thangam, V. [1 ]
Chandrasekaran, K. [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Comp Sci & Engn, Surathkal, India
来源
SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016 | 2016年 / 625卷
关键词
Secure multi-party computation; Outsourced computation; CTR1-SMPC; Improved CTR1-SMPC;
D O I
10.1007/978-981-10-2738-3_17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure Multi-Party Computation (SMPC) is a scheme where a set of trusted users will calculate a certain function on their inputs where the inputs will be always in an encrypted format for security purpose. In many cases, outsourcing of these calculations to an untrusted cloud server is desirable because of huge computational power of cloud server and storage space provided by them to process the data. However, the existing secure computation approaches are based on either a single key setup or old traditional encryption methods. In this paper, we suggested two secure multi-party computation techniques based on the latest elliptic curve cryptosystem. In which, we used two non-colluding cloud servers to co-operatively compute the outsourcing calculation with minimum number of interactions between them. However, it is ensured that the inputs, intermediate and final results all remain secret throughout the calculation.
引用
收藏
页码:199 / 212
页数:14
相关论文
共 50 条
  • [21] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [22] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [23] Generic server-aided secure multi-party computation in cloud computing
    Wu, Yulin
    Wang, Xuan
    Susilo, Willy
    Yang, Guomin
    Jiang, Zoe L.
    Yiu, Siu-Ming
    Wang, Hao
    COMPUTER STANDARDS & INTERFACES, 2022, 79
  • [24] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [25] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [26] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287
  • [27] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [28] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
  • [29] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
  • [30] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083