Cheater-identifiable homomorphic secret sharing for outsourcing computations

被引:2
|
作者
He, Yan [1 ,2 ,3 ]
Zhang, Liang Feng [1 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai 201210, Peoples R China
[2] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Shanghai 200050, Peoples R China
[3] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
ENCRYPTION; DELEGATION;
D O I
10.1007/s12652-020-01814-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Homomorphic secret sharing (HSS) allows a dealer to share a secret x among m participants such that: (1) any unauthorized subset of the participants learns no information about x; and (2) every participant in an authorized subset can perform the computation of a function f on its share to obtain a partial result and these partial results suffice to recover f(x). In a multi-client multi-server setting, HSS can be used to outsource the computation of a function f on the dealer's (clients') private inputs and thus resolve one of the main security issues in outsourcing computation, i.e., the privacy of the client's data. Tsaloli, Liang, and Mitrokotsa (ProvSec 2018) proposed a verifiable HSS (VHSS) model where the partial results of the servers can be verified, in order to resolve another main security issue in outsourcing computation, i.e., the integrity of the outsourced computation. They also constructed a VHSS scheme for computing the product of the dealers' private inputs such that any proper subset of the servers learns no information about the private inputs. In this paper, we present an easy attack of their scheme with which even a single server is able to distinguish between two different sets of private inputs. We propose a new VHSS model and construct a new VHSS scheme for computing the same function. By properly choosing the parameters, our scheme allows cheater detection, cheater identification, robust decoding, and extremely fast verification and result decoding.
引用
收藏
页码:5103 / 5113
页数:11
相关论文
共 50 条
  • [21] An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency
    Roy, Partha Sarathi
    Adhikari, Avishek
    Xu, Rui
    Morozov, Kirill
    Sakurai, Kouichi
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 47 - +
  • [22] Ramp secret sharing with cheater identification in presence of rushing cheaters
    Pramanik, Jyotirmoy
    Adhikari, Avishek
    GROUPS COMPLEXITY CRYPTOLOGY, 2019, 11 (02) : 103 - 113
  • [23] Dynamic threshold and cheater resistance for Shamir secret sharing scheme
    Tartary, Christophe
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 103 - 117
  • [24] A verifiable secret sharing scheme with combiner verification and cheater identification
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [25] On the information rates of homomorphic secret sharing schemes
    Mejia, Carolina
    Andres Montoya, J.
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (07): : 1463 - 1482
  • [26] On ideal homomorphic secret sharing schemes and their decomposition
    Ghasemi, Fatemeh
    Kaboli, Reza
    Khazaei, Shahram
    Parviz, Maghsoud
    Rafiei, Mohammad-Mahdi
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (09) : 2079 - 2096
  • [27] On ideal homomorphic secret sharing schemes and their decomposition
    Fatemeh Ghasemi
    Reza Kaboli
    Shahram Khazaei
    Maghsoud Parviz
    Mohammad-Mahdi Rafiei
    Designs, Codes and Cryptography, 2021, 89 : 2079 - 2096
  • [28] Recent Advances in Function and Homomorphic Secret Sharing
    Boyle, Elette
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2017, 2017, 10698 : 1 - 26
  • [29] Homomorphic Secret Sharing from Paillier Encryption
    Fazio, Nelly
    Gennaro, Rosario
    Jafarikhah, Tahereh
    Skeith, William E., III
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 381 - 399
  • [30] Efficient secret sharing scheme with cheater identification based on QR code
    Huang, Peng-Cheng
    Chang, Chin-Chen
    Li, Yung-Hui
    Liu, Yanjun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (10) : 5144 - 5160