Collusion-Resilient and Maliciously Secure Cloud-Assisted Two-Party Computation Scheme in Mobile Cloud Computing

Zhusen Liu, Weizheng Wang, Yutong Ye, Nan Min, Zhenfu Cao, Lu Zhou, Zhe Liu*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

— Mobile smart devices provide convenience for people’s daily life with the users’ data, but also put consumers’ privacy and security at risk. Privacy-enhancing technologies (PETs), including secure two/multi-party computation, have emerged as solutions to alleviate privacy concerns in mobile cloud computing (MCC). However, cloud servers, although capable of easing the burden of PETs, introduce potential risks by being malicious and colluding with computation parties to access additional private data. In this article, we propose a privacy-preserving cloud-assisted two-party computation scheme and the optimized variant with the half-gate method in MCC with a higher security level. To the best of our knowledge, the work is the first cloud-assisted two-party computation, designed to resist all collusion attacks in the malicious model. This is achieved by distributing circuit generation tasks among the parties and separately processing private inputs based on authenticated garbled circuits. Security analysis demonstrates that our scheme ensures correctness and fairness. Performance comparison results indicate the efficiency of our work, even with stronger security against malicious servers and any collusion attack. It outperforms the state-of-the-art scheme, particularly in terms of the server’s communication cost in the online phase, achieving a remarkable reduction of approximately 96.8%.

Original languageEnglish
Pages (from-to)7019-7032
Number of pages14
JournalIEEE Transactions on Information Forensics and Security
Volume19
DOIs
StatePublished - 2024

Keywords

  • Cloud-assisted computation
  • collusion resilience
  • garbled circuit
  • malicious model
  • mobile cloud computing
  • secure two-party computation

Fingerprint

Dive into the research topics of 'Collusion-Resilient and Maliciously Secure Cloud-Assisted Two-Party Computation Scheme in Mobile Cloud Computing'. Together they form a unique fingerprint.

Cite this