Verifiable Computation on Outsourced Encrypted Data

On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authenticator, such as homomorphic signature with public verifiability and homomorphic MAC with...

Full description

Saved in:
Bibliographic Details
Main Authors: LAI, Junzuo, DENG, Robert H., PANG, Hwee Hwa, Weng, Jian
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2014
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/2253
https://ink.library.smu.edu.sg/context/sis_research/article/3253/viewcontent/Verifiable_Computation_on_Outsourced_Encrypted_Data__edited_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-3253
record_format dspace
spelling sg-smu-ink.sis_research-32532018-07-13T03:52:08Z Verifiable Computation on Outsourced Encrypted Data LAI, Junzuo DENG, Robert H. PANG, Hwee Hwa Weng, Jian On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authenticator, such as homomorphic signature with public verifiability and homomorphic MAC with private verifiability, guarantees authenticity of computation over outsourced data but does not provide data confidentiality. Since cloud servers are usually operated by third-party providers which are almost certain to be outside the trust domain of cloud users, neither homomorphic encryption nor homomorphic authenticator suffices for verifiable computation on outsourced encrypted data in the cloud. In this paper, we propose verifiable homomorphic encryption (VHE), which enables verifiable computation on outsourced encrypted data. We first introduce a new cryptographic primitive called homomorphic encrypted authenticator (HEA), which may be of independent interest. Informally, HEA can be viewed as a homomorphic authenticator in which the authenticator itself does not leak any information about the message it authenticates. Next, we show that the fully homomorphic MAC scheme, proposed by Gennaro and Wichs recently, is a fully HEA with weak unforgeability in the sense that an adversary is not allowed to make verification queries. We then propose a linearly HEA which can tolerate any number of malicious verification queries, i.e., it achieves (strong) unforgeability. Finally, we define VHE formally, and give a generic construction of VHE based on homomorphic encryption and HEA. Instantiating the generic construction, we derive a fully VHE with weak verifiability as well as a linearly VHE with (strong) verifiability. 2014-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/2253 info:doi/10.1007/978-3-319-11203-9_16 https://ink.library.smu.edu.sg/context/sis_research/article/3253/viewcontent/Verifiable_Computation_on_Outsourced_Encrypted_Data__edited_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
LAI, Junzuo
DENG, Robert H.
PANG, Hwee Hwa
Weng, Jian
Verifiable Computation on Outsourced Encrypted Data
description On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authenticator, such as homomorphic signature with public verifiability and homomorphic MAC with private verifiability, guarantees authenticity of computation over outsourced data but does not provide data confidentiality. Since cloud servers are usually operated by third-party providers which are almost certain to be outside the trust domain of cloud users, neither homomorphic encryption nor homomorphic authenticator suffices for verifiable computation on outsourced encrypted data in the cloud. In this paper, we propose verifiable homomorphic encryption (VHE), which enables verifiable computation on outsourced encrypted data. We first introduce a new cryptographic primitive called homomorphic encrypted authenticator (HEA), which may be of independent interest. Informally, HEA can be viewed as a homomorphic authenticator in which the authenticator itself does not leak any information about the message it authenticates. Next, we show that the fully homomorphic MAC scheme, proposed by Gennaro and Wichs recently, is a fully HEA with weak unforgeability in the sense that an adversary is not allowed to make verification queries. We then propose a linearly HEA which can tolerate any number of malicious verification queries, i.e., it achieves (strong) unforgeability. Finally, we define VHE formally, and give a generic construction of VHE based on homomorphic encryption and HEA. Instantiating the generic construction, we derive a fully VHE with weak verifiability as well as a linearly VHE with (strong) verifiability.
format text
author LAI, Junzuo
DENG, Robert H.
PANG, Hwee Hwa
Weng, Jian
author_facet LAI, Junzuo
DENG, Robert H.
PANG, Hwee Hwa
Weng, Jian
author_sort LAI, Junzuo
title Verifiable Computation on Outsourced Encrypted Data
title_short Verifiable Computation on Outsourced Encrypted Data
title_full Verifiable Computation on Outsourced Encrypted Data
title_fullStr Verifiable Computation on Outsourced Encrypted Data
title_full_unstemmed Verifiable Computation on Outsourced Encrypted Data
title_sort verifiable computation on outsourced encrypted data
publisher Institutional Knowledge at Singapore Management University
publishDate 2014
url https://ink.library.smu.edu.sg/sis_research/2253
https://ink.library.smu.edu.sg/context/sis_research/article/3253/viewcontent/Verifiable_Computation_on_Outsourced_Encrypted_Data__edited_.pdf
_version_ 1770571929329074176