Cheater-identifiable homomorphic secret sharing for outsourcing computations

被引:2
|
作者
He, Yan [1 ,2 ,3 ]
Zhang, Liang Feng [1 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai 201210, Peoples R China
[2] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Shanghai 200050, Peoples R China
[3] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
ENCRYPTION; DELEGATION;
D O I
10.1007/s12652-020-01814-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Homomorphic secret sharing (HSS) allows a dealer to share a secret x among m participants such that: (1) any unauthorized subset of the participants learns no information about x; and (2) every participant in an authorized subset can perform the computation of a function f on its share to obtain a partial result and these partial results suffice to recover f(x). In a multi-client multi-server setting, HSS can be used to outsource the computation of a function f on the dealer's (clients') private inputs and thus resolve one of the main security issues in outsourcing computation, i.e., the privacy of the client's data. Tsaloli, Liang, and Mitrokotsa (ProvSec 2018) proposed a verifiable HSS (VHSS) model where the partial results of the servers can be verified, in order to resolve another main security issue in outsourcing computation, i.e., the integrity of the outsourced computation. They also constructed a VHSS scheme for computing the product of the dealers' private inputs such that any proper subset of the servers learns no information about the private inputs. In this paper, we present an easy attack of their scheme with which even a single server is able to distinguish between two different sets of private inputs. We propose a new VHSS model and construct a new VHSS scheme for computing the same function. By properly choosing the parameters, our scheme allows cheater detection, cheater identification, robust decoding, and extremely fast verification and result decoding.
引用
收藏
页码:5103 / 5113
页数:11
相关论文
共 50 条
  • [1] Cheater-identifiable homomorphic secret sharing for outsourcing computations
    Yan He
    Liang Feng Zhang
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5103 - 5113
  • [2] Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication
    Hayashi, Masahito
    Koshiba, Takeshi
    2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 2614 - 2618
  • [3] Cheater identifiable visual secret sharing scheme
    Gan Zhi & Chen Kefei1. Computer Science Department
    Journal of Systems Engineering and Electronics, 2005, (01) : 233 - 236
  • [4] Note on Some Recent Cheater Identifiable Secret Sharing Schemes
    Xu, Rui
    Morozov, Kirill
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (08) : 1814 - 1819
  • [5] Almost Optimum t-Cheater Identifiable Secret Sharing Schemes
    Obana, Satoshi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 284 - 302
  • [6] t-Cheater identifiable (k,n) threshold secret sharing schemes
    Kurosawa, K
    Obana, S
    Ogata, W
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 410 - 423
  • [7] A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
    Chen, Zhenhua
    Li, Shundong
    Zhu, Youwen
    Yan, Jianhua
    Xu, Xinli
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3592 - 3601
  • [8] Cheater identification in secret sharing scheme
    Shi, Ronghua
    Hu, Xiangling
    Dianzi Keji Daxue Xuebao/Journal of University of Electronic Science and Technology of China, 2000, 29 (01): : 38 - 40
  • [9] Secret Sharing Mechanism with Cheater Detection
    Lin, Pei-Yu
    Chen, Yi-Hui
    Hsu, Ming-Chieh
    Juang, Fu-Ming
    2013 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2013,
  • [10] Verifiable Image Secret Sharing with Cheater Identification
    Patil, Sonali D.
    Ithape, Priya K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1238 - 1241