Efficient and Privacy-Preserving Outsourced Calculation with Multiple Keys Using Chinese Remainder Theorem

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

We propose a new scheme for privacy-preserving outsourced calculation. With the help of this scheme, a user on a local host can securely transfer his sensitive information to a cloud platform for processing and storage avoiding disclosing the original information to the unreliable cloud and prying eyes. In addition, the Cloud Platform (CP) can carry out specifical operations on ciphertexts with the help of a Cryptographic Service Provider (CSP) according to the user's requests and send the results to user in the form of ciphertext. Furthermore, data encrypted with multiple keys can also be calculated together, and the computed results will be decrypted by an authorized receiver. We not only implement addition and multiplication operations on ciphertexts, but also design an efficient comparison protocol on ciphertexts (the operations are all in encrypted domain). We then show the security of our encryption and the suggested secure computation sub-protocols. We use a one-way trapdoor permutation and a symmetric somewhat homomorphic encryption as the framework's building blocks rather than the fully homomorphic encryption (FHE) technique. Finally, we use simulations to show the effectiveness and extraordinary efficiency of our suggested scheme.

Original languageEnglish
Title of host publicationProceedings - 2022 2nd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages439-445
Number of pages7
ISBN (Electronic)9781665454766
DOIs
StatePublished - 2022
Event2nd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2022 - Wuhan, China
Duration: 19 Aug 202221 Aug 2022

Publication series

NameProceedings - 2022 2nd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2022

Conference

Conference2nd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2022
Country/TerritoryChina
CityWuhan
Period19/08/2221/08/22

Keywords

  • Privacy-preserving
  • efficiency
  • homomorphic encryption
  • multiple keys
  • outsourced computation

Fingerprint

Dive into the research topics of 'Efficient and Privacy-Preserving Outsourced Calculation with Multiple Keys Using Chinese Remainder Theorem'. Together they form a unique fingerprint.

Cite this