Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2014/413265 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832561331496026112 |
---|---|
author | Yi Sun Qiaoyan Wen Yudong Zhang Hua Zhang Zhengping Jin Wenmin Li |
author_facet | Yi Sun Qiaoyan Wen Yudong Zhang Hua Zhang Zhengping Jin Wenmin Li |
author_sort | Yi Sun |
collection | DOAJ |
description | We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. |
format | Article |
id | doaj-art-012cdde86e93478d8921be8052cc5b10 |
institution | Kabale University |
issn | 2356-6140 1537-744X |
language | English |
publishDate | 2014-01-01 |
publisher | Wiley |
record_format | Article |
series | The Scientific World Journal |
spelling | doaj-art-012cdde86e93478d8921be8052cc5b102025-02-03T01:25:20ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/413265413265Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty ComputationYi Sun0Qiaoyan Wen1Yudong Zhang2Hua Zhang3Zhengping Jin4Wenmin Li5State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaBrain Image Processing, Columbia University, New York, NY 10032, USAState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaWe focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.http://dx.doi.org/10.1155/2014/413265 |
spellingShingle | Yi Sun Qiaoyan Wen Yudong Zhang Hua Zhang Zhengping Jin Wenmin Li Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation The Scientific World Journal |
title | Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation |
title_full | Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation |
title_fullStr | Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation |
title_full_unstemmed | Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation |
title_short | Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation |
title_sort | two cloud servers assisted secure outsourcing multiparty computation |
url | http://dx.doi.org/10.1155/2014/413265 |
work_keys_str_mv | AT yisun twocloudserversassistedsecureoutsourcingmultipartycomputation AT qiaoyanwen twocloudserversassistedsecureoutsourcingmultipartycomputation AT yudongzhang twocloudserversassistedsecureoutsourcingmultipartycomputation AT huazhang twocloudserversassistedsecureoutsourcingmultipartycomputation AT zhengpingjin twocloudserversassistedsecureoutsourcingmultipartycomputation AT wenminli twocloudserversassistedsecureoutsourcingmultipartycomputation |