One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing

被引:15
|
作者
Xie, Dong [1 ,2 ,3 ]
Chen, Fulong [1 ,3 ]
Luo, Yonglong [1 ,3 ]
Li, Lixiang [2 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu 241002, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Anhui Normal Univ, Anhui Prov Key Lab Network & Informat Secur, Wuhu 241002, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Compressed sensing; One-to-many encryption; Privacy-preserving; Outsourced decryption; RESTRICTED ISOMETRY PROPERTY;
D O I
10.1016/j.dsp.2019.102587
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a classical framework for signal compression and reconstruction, compressed sensing (CS) has dramatically improved the state-of-the-art in many fields such as image processing, wireless communication, medical imaging and optics. Since CS integrates data compression and encryption, CS-based cryptographic primitives have attracted great attention in recent years. Note that almost all the existing CS-based encryption schemes are one-to-one symmetric cryptosystems. Unlike traditional permutation-diffusion based symmetric cryptosystems (e.g., DES and AES), CS-based encryption schemes do not have the characteristic of high efficiency because decryption procedures require to perform complex and time-consuming reconstruction algorithms. In this paper, we break the traditional one-to-one encryption framework of CS-based cryptosystems, and present an efficient one-to-many encryption model for flexible application scenarios. Specifically, the information sender first encrypts several plaintext images simultaneously for different users according to our proposed attribute-based key distribution mechanism, and then sends the ciphertext to the cloud storage server. Any user who has one of attributes can efficiently obtain the corresponding plaintext by using an outsourced decryption server (ODS). To prevent the ODS from stealing the plaintexts for illegal activities, we employ a homomorphic transformation algorithm which can transform the original reconstruction problem into a variant one. The experimental results and the comparison with similar works demonstrate the feasibility and the superiority of the proposed scheme. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Privacy-Preserving Deep Learning With Homomorphic Encryption: An Introduction
    Falcetta, Alessandro
    Roveri, Manuel
    IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2022, 17 (03) : 14 - 25
  • [32] Privacy-preserving cancer type prediction with homomorphic encryption
    Sarkar, Esha
    Chielle, Eduardo
    Gursoy, Gamze
    Chen, Leo
    Gerstein, Mark
    Maniatakos, Michail
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [33] Homomorphic Encryption for Privacy-Preserving Genome Sequences Search
    Oguchi, Masato
    Rohloff, Kurt
    Yamada, Yuki
    2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019), 2019, : 7 - 12
  • [34] An Efficient and Privacy-Preserving Federated Learning Approach Based on Homomorphic Encryption
    Castro, Francesco
    Impedovo, Donato
    Pirlo, Giuseppe
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2025, 6 : 336 - 347
  • [35] Privacy-Preserving Biometric Matching Using Homomorphic Encryption
    Pradel, Gaetan
    Mitchell, Chris
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 494 - 505
  • [36] BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
    Wibawa, Febrianti
    Catak, Ferhat Ozgur
    Sarp, Salih
    Kuzlu, Murat
    CRYPTOGRAPHY, 2022, 6 (03)
  • [37] DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
    Wang, Jing
    Wu, Fengheng
    Zhang, Tingbo
    Wu, Xiaohua
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 29 - 32
  • [38] A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement
    Zhu, Xiaoling
    Lu, Yang
    Zhu, Xiaojuan
    Qiu, Shuwei
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 54 - 59
  • [39] Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Duhyeong
    Kim, Yongdai
    Song, Yongsoo
    IEEE ACCESS, 2018, 6 : 46938 - 46948
  • [40] Practical privacy-preserving compressed sensing image recovery in the cloud
    Kai HUANG
    Ming XU
    Shaojing FU
    Dongsheng WANG
    Science China(Information Sciences), 2017, 60 (09) : 277 - 285