One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing

被引:15
|
作者
Xie, Dong [1 ,2 ,3 ]
Chen, Fulong [1 ,3 ]
Luo, Yonglong [1 ,3 ]
Li, Lixiang [2 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu 241002, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Anhui Normal Univ, Anhui Prov Key Lab Network & Informat Secur, Wuhu 241002, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Compressed sensing; One-to-many encryption; Privacy-preserving; Outsourced decryption; RESTRICTED ISOMETRY PROPERTY;
D O I
10.1016/j.dsp.2019.102587
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a classical framework for signal compression and reconstruction, compressed sensing (CS) has dramatically improved the state-of-the-art in many fields such as image processing, wireless communication, medical imaging and optics. Since CS integrates data compression and encryption, CS-based cryptographic primitives have attracted great attention in recent years. Note that almost all the existing CS-based encryption schemes are one-to-one symmetric cryptosystems. Unlike traditional permutation-diffusion based symmetric cryptosystems (e.g., DES and AES), CS-based encryption schemes do not have the characteristic of high efficiency because decryption procedures require to perform complex and time-consuming reconstruction algorithms. In this paper, we break the traditional one-to-one encryption framework of CS-based cryptosystems, and present an efficient one-to-many encryption model for flexible application scenarios. Specifically, the information sender first encrypts several plaintext images simultaneously for different users according to our proposed attribute-based key distribution mechanism, and then sends the ciphertext to the cloud storage server. Any user who has one of attributes can efficiently obtain the corresponding plaintext by using an outsourced decryption server (ODS). To prevent the ODS from stealing the plaintexts for illegal activities, we employ a homomorphic transformation algorithm which can transform the original reconstruction problem into a variant one. The experimental results and the comparison with similar works demonstrate the feasibility and the superiority of the proposed scheme. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Privacy-Preserving Federated Learning Using Homomorphic Encryption
    Park, Jaehyoung
    Lim, Hyuk
    APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [22] Approximate homomorphic encryption based privacy-preserving machine learning: a survey
    Yuan, Jiangjun
    Liu, Weinan
    Shi, Jiawen
    Li, Qingqing
    ARTIFICIAL INTELLIGENCE REVIEW, 2025, 58 (03)
  • [23] Privacy-preserving outsourced image feature extraction
    Li, Dongmei
    Doug, Xiaolei
    Cao, Zhenfu
    Wang, Haijiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 59 - 64
  • [24] A Privacy-Preserving Homomorphic Encryption Scheme for the Internet of Things
    Zouari, Jaweher
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 1939 - 1944
  • [25] Efficient homomorphic encryption framework for privacy-preserving regression
    Byun, Junyoung
    Park, Saerom
    Choi, Yujin
    Lee, Jaewook
    APPLIED INTELLIGENCE, 2023, 53 (09) : 10114 - 10129
  • [26] Privacy-preserving genotype imputation with fully homomorphic encryption
    Gursoy, Gamze
    Chielle, Eduardo
    Brannon, Charlotte M.
    Maniatakos, Michail
    Gerstein, Mark
    CELL SYSTEMS, 2022, 13 (02) : 173 - +
  • [27] Privacy-preserving cancer type prediction with homomorphic encryption
    Esha Sarkar
    Eduardo Chielle
    Gamze Gursoy
    Leo Chen
    Mark Gerstein
    Michail Maniatakos
    Scientific Reports, 13
  • [28] Privacy-preserving Surveillance Methods using Homomorphic Encryption
    Bowditch, William
    Abramson, Will
    Buchanan, William J.
    Pitropakis, Nikolaos
    Hall, Adam J.
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 240 - 248
  • [29] Efficient homomorphic encryption framework for privacy-preserving regression
    Junyoung Byun
    Saerom Park
    Yujin Choi
    Jaewook Lee
    Applied Intelligence, 2023, 53 : 10114 - 10129
  • [30] Privacy-Preserving Feature Selection with Fully Homomorphic Encryption
    Ono, Shinji
    Takata, Jun
    Kataoka, Masaharu
    Tomohiro, I
    Shin, Kilho
    Sakamoto, Hiroshi
    ALGORITHMS, 2022, 15 (07)