Cheater-identifiable homomorphic secret sharing for outsourcing computations

被引:2
|
作者
He, Yan [1 ,2 ,3 ]
Zhang, Liang Feng [1 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai 201210, Peoples R China
[2] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Shanghai 200050, Peoples R China
[3] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
ENCRYPTION; DELEGATION;
D O I
10.1007/s12652-020-01814-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Homomorphic secret sharing (HSS) allows a dealer to share a secret x among m participants such that: (1) any unauthorized subset of the participants learns no information about x; and (2) every participant in an authorized subset can perform the computation of a function f on its share to obtain a partial result and these partial results suffice to recover f(x). In a multi-client multi-server setting, HSS can be used to outsource the computation of a function f on the dealer's (clients') private inputs and thus resolve one of the main security issues in outsourcing computation, i.e., the privacy of the client's data. Tsaloli, Liang, and Mitrokotsa (ProvSec 2018) proposed a verifiable HSS (VHSS) model where the partial results of the servers can be verified, in order to resolve another main security issue in outsourcing computation, i.e., the integrity of the outsourced computation. They also constructed a VHSS scheme for computing the product of the dealers' private inputs such that any proper subset of the servers learns no information about the private inputs. In this paper, we present an easy attack of their scheme with which even a single server is able to distinguish between two different sets of private inputs. We propose a new VHSS model and construct a new VHSS scheme for computing the same function. By properly choosing the parameters, our scheme allows cheater detection, cheater identification, robust decoding, and extremely fast verification and result decoding.
引用
收藏
页码:5103 / 5113
页数:11
相关论文
共 50 条
  • [41] Evolving Homomorphic Secret Sharing for Hierarchical Access Structures
    Phalakarn, Kittiphop
    Suppakitpaisarn, Vorapong
    Attrapadung, Nuttapong
    Matsuura, Kanta
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2021, 2021, 12835 : 77 - 96
  • [42] Sum It Up: Verifiable Additive Homomorphic Secret Sharing
    Tsaloli, Georgia
    Mitrokotsa, Aikaterini
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 115 - 132
  • [43] Applying cheating identifiable secret sharing scheme in multimedia security
    Zheng Ma
    Yan Ma
    Xiaohong Huang
    Manjun Zhang
    Yanxiao Liu
    EURASIP Journal on Image and Video Processing, 2020
  • [44] Applying cheating identifiable secret sharing scheme in multimedia security
    Ma, Zheng
    Ma, Yan
    Huang, Xiaohong
    Zhang, Manjun
    Liu, Yanxiao
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [45] A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection
    Chang, Ching-Chun
    Horng, Ji-Hwei
    Shih, Chia-Shou
    Chang, Chin-Chen
    SENSORS, 2020, 20 (13) : 1 - 18
  • [46] Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ≤ left perpendicular((k-2)/2)right perpendicular
    Liu, Yan-Xiao
    IET INFORMATION SECURITY, 2014, 8 (01) : 37 - 41
  • [47] Multiparty key agreement protocol with cheater identification based on Shamir secret sharing
    Yoo, KY
    Ryu, EK
    Im, JY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 655 - 664
  • [48] A Secure Threshold Secret Sharing Framework for Database Outsourcing
    Pathak, Ajeet Ram
    Padmavathi, B.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1642 - 1649
  • [49] Outsourcing secret sharing scheme based on homomorphism encryption
    Zhang, En
    Peng, Jie
    Li, Ming
    IET INFORMATION SECURITY, 2018, 12 (01) : 94 - 99
  • [50] Security Limitations of Using Secret Sharing for Data Outsourcing
    Dautrich, Jonathan L.
    Ravishankar, Chinya V.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 145 - 160