Client-Server Framework for Securely Outsourcing Computations

نویسنده

  • Thijs Veugen
چکیده

In recommendation systems, service providers can recommend products to their customers based on personal data from many users. To avoid leakage of these personal data, service providers use secret sharing. This enables them to compute the recommendation, while remaining oblivious to the contents. Only the user requesting the output will be able to combine all shares of the recommendation and learn the result. Although similar secure recommendations systems have been developed before, they were either less secure, or less efficient. This framework is the first one that uses fast cryptographic techniques within a ‘malicious security model’. By precomputing a lot of input independent data, the two servers were able to compute a recommendation

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures

Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in database outsourcing, a client’s database is stored and maintained by an untrusted server. Also, in simple storage systems, clients can store very large amounts of data but at the same time, they want to assure their ...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

Privacy preserving, verifiable and efficient outsourcing algorithm for matrix multiplication to a malicious cloud server

Matrix Multiplication is a basic engineering and scientific problem, which has application in various domains. There exists many cryptographic solutions for secure computation of matrix multiplication, but cryptographic preamble makes them infeasible for outsourcing with large input size to the cloud server. In this paper, we propose a privacy-preserving, verifiable and efficient algorithm for ...

متن کامل

How to Securely Outsource Cryptographic Computations

We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a computationally limited device to an untrusted helper. In our model, the adversarial environment writes the software for the helper, but then does not have direct communication with it once the device starts relying on it. ...

متن کامل

Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps

Verifiable computation (VC) allows a computationally weak client to outsource the evaluation of a function on many inputs to a powerful but untrusted server. The client invests a large amount of off-line computation and gives an encoding of its function to the server. The server returns both an evaluation of the function on the client’s input and a proof such that the client can verify the eval...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • ERCIM News

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016