Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment

被引:0
|
作者
Thangam, V. [1 ]
Chandrasekaran, K. [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Comp Sci & Engn, Surathkal, India
来源
SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016 | 2016年 / 625卷
关键词
Secure multi-party computation; Outsourced computation; CTR1-SMPC; Improved CTR1-SMPC;
D O I
10.1007/978-981-10-2738-3_17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure Multi-Party Computation (SMPC) is a scheme where a set of trusted users will calculate a certain function on their inputs where the inputs will be always in an encrypted format for security purpose. In many cases, outsourcing of these calculations to an untrusted cloud server is desirable because of huge computational power of cloud server and storage space provided by them to process the data. However, the existing secure computation approaches are based on either a single key setup or old traditional encryption methods. In this paper, we suggested two secure multi-party computation techniques based on the latest elliptic curve cryptosystem. In which, we used two non-colluding cloud servers to co-operatively compute the outsourcing calculation with minimum number of interactions between them. However, it is ensured that the inputs, intermediate and final results all remain secret throughout the calculation.
引用
收藏
页码:199 / 212
页数:14
相关论文
共 50 条
  • [31] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [32] Secure Multi-party Computation and Its Applications
    Veugen, Thijs
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 3 - 5
  • [33] Secure Multi-party Data Communications in Cloud Augmented IoT EnvironmentSecure Multi-party Data Communications in Cloud Augmented IoT Environment
    Huang, Xueqing
    Ansari, Nirwan
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [34] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [35] Secure Multi-party Computation Scheme of Shared Energy Storage Index Based on Blockchain Environment
    Jiang, Xinyue
    Li, Leyi
    Qiu, Weiqiang
    Pei, You
    Tao, Yibin
    Lin, Zhenzhi
    2021 IEEE IAS INDUSTRIAL AND COMMERCIAL POWER SYSTEM ASIA (IEEE I&CPS ASIA 2021), 2021, : 586 - 591
  • [36] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [37] A New Approach to Interdomain Routing Based on Secure Multi-Party Computation
    Gupta, Debayan
    Segal, Aaron
    Panda, Aurojit
    Segev, Gil
    Schapira, Michael
    Feigenbaum, Joan
    Rexford, Jenifer
    Shenker, Scott
    PROCEEDINGS OF THE 11TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-XI), 2012, : 37 - 42
  • [38] Brief Announcement: Secure Data Structures based on Multi-Party Computation
    Toft, Tomas
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 291 - 292
  • [39] Secure Byzantine resilient federated learning based on multi-party computation
    Gao, Hongfeng
    Huang, Hao
    Tian, Youliang
    Tongxin Xuebao/Journal on Communications, 2025, 46 (02): : 108 - 122
  • [40] Secure Multi-Party Computation Based on Cut-and-Choose Technology
    Zhao C.
    Xu J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1800 - 1818