Sum It Up: Verifiable Additive Homomorphic Secret Sharing

被引:7
|
作者
Tsaloli, Georgia [1 ]
Mitrokotsa, Aikaterini [1 ]
机构
[1] Chalmers Univ Technol, Gothenburg, Sweden
关键词
Function secret sharing; Homomorphic secret sharing; Verifiable computation; Public verifiability; COMPUTATION;
D O I
10.1007/978-3-030-40921-0_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many situations, clients (e.g., researchers, companies, hospitals) need to outsource joint computations based on joint inputs to external cloud servers in order to provide useful results. Often clients want to guarantee that the results are correct and thus, an output that can be publicly verified is required. However, important security and privacy challenges are raised, since clients may hold sensitive information and the cloud servers can be untrusted. Our goal is to allow the clients to protect their secret data, while providing public verifiability i.e., everyone should be able to verify the correctness of the computed result. In this paper, we propose three concrete constructions of verifiable additive homomorphic secret sharing (VAHSS) to solve this problem. Our instantiations combine an additive homomorphic secret sharing (HSS) scheme, which relies on Shamir's secret sharing scheme over a finite field F, for computing the sum of the clients' secret inputs, and three different methods for achieving public verifiability. More precisely, we employ: (i) homomorphic collision-resistant hash functions; (ii) linear homomorphic signatures; as well as (iii) a threshold RSA signature scheme. In all three cases we provide a detailed correctness, security and verifiability analysis and discuss their efficiency.
引用
收藏
页码:115 / 132
页数:18
相关论文
共 50 条
  • [1] Verifiable Additive Homomorphic Secret Sharing with Dynamic Aggregation Support
    Wang, Sinan
    Peng, Changgen
    Deng, Xinxin
    Peng, Zongfeng
    Chen, Qihong
    ELECTRONICS, 2024, 13 (12)
  • [2] Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
    Tsaloli, Georgia
    Banegas, Gustavo
    Mitrokotsa, Aikaterini
    CRYPTOGRAPHY, 2020, 4 (03) : 1 - 22
  • [3] Verifiable Homomorphic Secret Sharing for Machine Learning Classifiers
    Chen, Xin
    IEEE ACCESS, 2023, 11 : 43639 - 43647
  • [4] Verifiable Homomorphic Secret Sharing for Low Degree Polynomials
    Chen, Xin
    Zhang, Liang Feng
    Liu, Jing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 2882 - 2895
  • [5] Publicly Verifiable Homomorphic Secret Sharing for Polynomial Evaluation
    Chen, Xin
    Zhang, Liang Feng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4609 - 4624
  • [6] Verifiable secret redistribution protocol based on additive sharing
    Institute of Network Security, Shandong University, Jinan 250100, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2006, 1 (23-27):
  • [7] A verifiable secret shuffle of homomorphic encryptions
    Groth, J
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 145 - 160
  • [8] A Verifiable Secret Shuffle of Homomorphic Encryptions
    Groth, Jens
    JOURNAL OF CRYPTOLOGY, 2010, 23 (04) : 546 - 579
  • [9] A Verifiable Secret Shuffle of Homomorphic Encryptions
    Jens Groth
    Journal of Cryptology, 2010, 23 : 546 - 579
  • [10] Publicly verifiable secret sharing
    Stadler, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 190 - 199