Sharing Data Homomorphically Encrypted with Different Encryption Keys
نویسندگان
چکیده
In this paper, we propose the first homomorphic based proxy re-encryption (HPRE) solution that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility to process such data remotely. More clearly, this scheme makes possible to switch the public encryption key to another one without the help of a trusted third party. Its originality stands on a method we propose so as to compute the difference between two encrypted data without decrypting them and with no extra communications. Basically, in our HPRE scheme, the two users, the delegator and the delegate, ask the cloud server to generate an encrypted noise based on a secret key, both users previously agreed on. Based on our solution for comparing encrypted data, the cloud computes in clear the differences in-between the encrypted noise and the encrypted data of the delegator, obtaining thus blinded data. By next the cloud encrypts these differences with the public key of the delegate. As the noise is also known of the delegate, this one just has to remove it to get access to the data encrypted with his public key. This solution has been experimented in the case of the sharing of images outsourced into a semihonest cloud server.
منابع مشابه
Key Aggregate Searchable Encryption for Group Data Sharing Via Cloud Data Storage
the ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferred flexibility of allocating any group documents with any group of users by attaining weightage different enc...
متن کاملAn Efficient Reduction of Encryption Keys for Group Data Sharing via Cloud Storage
The art of selectively sharing encrypted data with different users via public clouds to rage may greatly ease security concerns with unintentional data leaks in the cloud. While sharing any group of selected documents with any group of users demands different encryption keys to be used for different documents.The user receives a large number of keys for both encryption and search. The user shou...
متن کاملZeroDB white paper
ZeroDB is an end-to-end encrypted database that enables clients to operate on (search, sort, query, and share) encrypted data without exposing encryption keys or cleartext data to the database server. The familiar client-server architecture is unchanged, but query logic and encryption keys are pushed client-side. Since the server has no insight into the nature of the data, the risk of data bein...
متن کاملDemo Abstract: Talos a Platform for Processing Encrypted IoT Data
Internet of Things (IoT) applications today often utilize the cloud to provide storage and ubiquitous access to collected data. Leaving such granular, sensitive, and personal data unprotected on the cloud and vulnerable to system breaches or curious administrators is critical. In this extended abstract, we present Talos [3], a framework that embraces the computational resources available in the...
متن کاملSecure Data Sharing in Cloud Environment Using Multi Authority Attribute Based Encryption
Cloud computing, as associate rising computing paradigm, permits users to remotely store their knowledge during a cloud, thus on relish services on-demand. With fast development of cloud computing, additional and additional enterprises can source their sensitive knowledge for sharing during a cloud. To stay the shared knowledge confidential against untrusted cloud service suppliers (CSPs), a na...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1706.01756 شماره
صفحات -
تاریخ انتشار 2017