• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhao, B. (Zhao, B..) [1] | Deng, W. (Deng, W..) [2] | Li, X. (Li, X..) [3] | Liu, X. (Liu, X..) [4] | Pei, Q. (Pei, Q..) [5] | Deng, R.H. (Deng, R.H..) [6]

Indexed by:

Scopus

Abstract:

Secure outsourced computation is critical for cloud computing to safeguard data confidentiality and ensure data usability. Recently, secure outsourced computation schemes following a twin-server architecture based on partially homomorphic cryptosystems have received increasing attention. The Secure Outsourced Computation on Integers (SOCI) [1] toolkit is the state-of-the-art among these schemes which can perform secure computation on integers without requiring the costly bootstrapping operation as in fully homomorphic encryption; however, SOCI suffers from relatively large computation and communication overhead. In this paper, we propose SOCI+ which significantly improves the performance of SOCI. Specifically, SOCI+ employs a novel (2,2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive, and supports a suite of efficient secure arithmetic computation on integers protocols, including a secure multiplication protocol (SMUL), a secure comparison protocol (SCMP), a secure sign bit-acquisition protocol (SSBA), and a secure division protocol (SDIV), all based on the (2,2)-threshold Paillier cryptosystem with fast encryption and decryption. In addition, SOCI+ incorporates an offline and online computation mechanism to further optimize its performance. We perform rigorous theoretical analysis to prove the correctness and security of SOCI+. Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.3 times more efficient in online runtime and 40% less in communication overheads. IEEE

Keyword:

Computer architecture Costs Cryptography homomorphic encryption Homomorphic encryption Paillier cryptosystem Protocols secure computing Secure outsourced computation Servers Threat modeling threshold cryptosystem

Community:

  • [ 1 ] [Zhao B.]Guangzhou Institute of Technology, Xidian University, Guangzhou, China
  • [ 2 ] [Deng W.]Guangzhou Institute of Technology, Xidian University, Guangzhou, China
  • [ 3 ] [Li X.]School of Computing and Information Systems, Singapore Management University, Singapore
  • [ 4 ] [Liu X.]College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 5 ] [Pei Q.]State Key Laboratory of Integrated Service Networks, and School of Telecommunications Engineering, Xidian University, Xi’an, China
  • [ 6 ] [Deng R.H.]School of Computing and Information Systems, Singapore Management University, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2024

Volume: 19

Page: 1-1

6 . 3 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:75/10118270
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1