Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys...

Full description

Saved in:
Bibliographic Details
Main Authors: Yi Sun, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin, Wenmin Li
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/413265
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832561331496026112
author Yi Sun
Qiaoyan Wen
Yudong Zhang
Hua Zhang
Zhengping Jin
Wenmin Li
author_facet Yi Sun
Qiaoyan Wen
Yudong Zhang
Hua Zhang
Zhengping Jin
Wenmin Li
author_sort Yi Sun
collection DOAJ
description We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.
format Article
id doaj-art-012cdde86e93478d8921be8052cc5b10
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-012cdde86e93478d8921be8052cc5b102025-02-03T01:25:20ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/413265413265Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty ComputationYi Sun0Qiaoyan Wen1Yudong Zhang2Hua Zhang3Zhengping Jin4Wenmin Li5State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaBrain Image Processing, Columbia University, New York, NY 10032, USAState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaWe focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.http://dx.doi.org/10.1155/2014/413265
spellingShingle Yi Sun
Qiaoyan Wen
Yudong Zhang
Hua Zhang
Zhengping Jin
Wenmin Li
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
The Scientific World Journal
title Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
title_full Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
title_fullStr Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
title_full_unstemmed Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
title_short Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
title_sort two cloud servers assisted secure outsourcing multiparty computation
url http://dx.doi.org/10.1155/2014/413265
work_keys_str_mv AT yisun twocloudserversassistedsecureoutsourcingmultipartycomputation
AT qiaoyanwen twocloudserversassistedsecureoutsourcingmultipartycomputation
AT yudongzhang twocloudserversassistedsecureoutsourcingmultipartycomputation
AT huazhang twocloudserversassistedsecureoutsourcingmultipartycomputation
AT zhengpingjin twocloudserversassistedsecureoutsourcingmultipartycomputation
AT wenminli twocloudserversassistedsecureoutsourcingmultipartycomputation