Multiparty Cloud Computation
نویسندگان
چکیده
With the increasing popularity of the cloud, clients oursource their data to clouds in order to take advantage of unlimited virtualized storage space and the low management cost. Such trend prompts the privately oursourcing computation, called multiparty cloud computation (MCC): Given k clients storing their data in the cloud, how can they perform the joint functionality by contributing their private data as inputs, and making use of cloud’s powerful computation capability. Namely, the clients wish to oursource computation to the cloud together with their private data stored in the cloud, which naturally happens when the computation is involved with large datasets, e.g., to analyze malicious URLs. We note that the MCC problem is different from widely considered concepts, e.g., secure multiparty computation and multiparty computation with server aid. To address this problem, we introduce the notion of homomorphic threshold proxy re-encryption schemes, which are encryption schemes that enjoy three promising properties: proxy re-encryption – transforming encrypted data of one user to encrypted data of target user, threshold decryption – decrypting encrypted data by combining secret key shares obtained by a set of users, and homomorphic computation – evaluating functions on the encrypted data. To demonstrate the feasibility of the proposed approach, we present an encryption scheme which allows anyone to compute arbitrary many additions and at most one multiplications.
منابع مشابه
Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation
With computation power in the cloud becoming a commodity, it is more and more convenient to outsource computations to external computation parties. Assuring confidentiality, even of inputs by mutually distrusting inputters, is possible by distributing computations between different parties using multiparty computation. Unfortunately, this typically only guarantees correctness if a limited numbe...
متن کاملTwo-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that ...
متن کاملNew Privacy Preserving Back Propagation Learning for Secure Multiparty Computation
Many studies have been done with the security of cloud computing. Data encryption is one of typical approaches. However, complex computing requirement for encrypted data needs a great deal of time and effort for the system in this case. Therefore, another studies on secure sharing and computing methods are made to avoid secure risks being abused or leaked and to reduce computing cost. The secur...
متن کاملPrivacy Preserving Fuzzy Modeling for Secure Multiparty Computation
Many studies on privacy preserving of machine learning and data mining have been done in various methods by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Data encryption is one of typical approaches. However, its system requires both encryption and decryption for requests of client or user, so its complexity of computation is very high. Therefore, studie...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1206.3717 شماره
صفحات -
تاریخ انتشار 2012