Efficient verifiable computation of linear and quadratic functions over encrypted data
In data outsourcing, a client stores a large amount of data on an untrusted server; subsequently, the client can request the server to compute a function on any subset of the data. This setting naturally leads to two security requirements: confidentiality of input data, and authenticity of computati...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3351 https://ink.library.smu.edu.sg/context/sis_research/article/4353/viewcontent/Efficient_verifiable_computation.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4353 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-43532017-12-07T06:36:13Z Efficient verifiable computation of linear and quadratic functions over encrypted data TRAN, Ngoc Hieu Hwee Hwa PANG, DENG, Robert H. In data outsourcing, a client stores a large amount of data on an untrusted server; subsequently, the client can request the server to compute a function on any subset of the data. This setting naturally leads to two security requirements: confidentiality of input data, and authenticity of computations. Existing approaches that satisfy both requirements simultaneously are built on fully homomorphic encryption, which involves expensive computation on the server and client and hence is impractical. In this paper, we propose two verifiable homomorphic encryption schemes that do not rely on fully homomorphic encryption. The first is a simple and efficient scheme for linear functions. The second scheme supports the class of multivariate quadratic functions, by combining the Paillier cryptosystem with a new homomorphic message authentication code (MAC) scheme. Through formal security analysis, we show that the schemes are semantically secure and unforgeable. 2016-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3351 info:doi/10.1145/2897845.2897892 https://ink.library.smu.edu.sg/context/sis_research/article/4353/viewcontent/Efficient_verifiable_computation.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Data outsourcing Homomorphic encryption Homomorphic MAC Verifiable computation Databases and Information Systems Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Data outsourcing Homomorphic encryption Homomorphic MAC Verifiable computation Databases and Information Systems Information Security |
spellingShingle |
Data outsourcing Homomorphic encryption Homomorphic MAC Verifiable computation Databases and Information Systems Information Security TRAN, Ngoc Hieu Hwee Hwa PANG, DENG, Robert H. Efficient verifiable computation of linear and quadratic functions over encrypted data |
description |
In data outsourcing, a client stores a large amount of data on an untrusted server; subsequently, the client can request the server to compute a function on any subset of the data. This setting naturally leads to two security requirements: confidentiality of input data, and authenticity of computations. Existing approaches that satisfy both requirements simultaneously are built on fully homomorphic encryption, which involves expensive computation on the server and client and hence is impractical. In this paper, we propose two verifiable homomorphic encryption schemes that do not rely on fully homomorphic encryption. The first is a simple and efficient scheme for linear functions. The second scheme supports the class of multivariate quadratic functions, by combining the Paillier cryptosystem with a new homomorphic message authentication code (MAC) scheme. Through formal security analysis, we show that the schemes are semantically secure and unforgeable. |
format |
text |
author |
TRAN, Ngoc Hieu Hwee Hwa PANG, DENG, Robert H. |
author_facet |
TRAN, Ngoc Hieu Hwee Hwa PANG, DENG, Robert H. |
author_sort |
TRAN, Ngoc Hieu |
title |
Efficient verifiable computation of linear and quadratic functions over encrypted data |
title_short |
Efficient verifiable computation of linear and quadratic functions over encrypted data |
title_full |
Efficient verifiable computation of linear and quadratic functions over encrypted data |
title_fullStr |
Efficient verifiable computation of linear and quadratic functions over encrypted data |
title_full_unstemmed |
Efficient verifiable computation of linear and quadratic functions over encrypted data |
title_sort |
efficient verifiable computation of linear and quadratic functions over encrypted data |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/3351 https://ink.library.smu.edu.sg/context/sis_research/article/4353/viewcontent/Efficient_verifiable_computation.pdf |
_version_ |
1770573119860244480 |