Assuring BetterTimes
We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field can be jointly computed on encrypted data using an additively homomorphic encryption scheme. Our protocol is secure against malicious adversaries. To moti...
- Autores:
- Tipo de recurso:
- Fecha de publicación:
- 2018
- Institución:
- Universidad del Rosario
- Repositorio:
- Repositorio EdocUR - U. Rosario
- Idioma:
- eng
- OAI Identifier:
- oai:repository.urosario.edu.co:10336/22313
- Acceso en línea:
- https://doi.org/10.3233/JCS-171085
https://repository.urosario.edu.co/handle/10336/22313
- Palabra clave:
- Data privacy
Geometric applications
Ho-momorphic encryptions
Homomorphic Encryption Schemes
Location privacy
Malicious adversaries
Privacy enhancing technologies
Prototypical implementation
Secure multi-party computation
Cryptography
Location privacy
Privacy-enhancing technologies
Secure multi-party computation
- Rights
- License
- Abierto (Texto Completo)
id |
EDOCUR2_7e3b08ba3120301277bbd7e07662760a |
---|---|
oai_identifier_str |
oai:repository.urosario.edu.co:10336/22313 |
network_acronym_str |
EDOCUR2 |
network_name_str |
Repositorio EdocUR - U. Rosario |
repository_id_str |
|
spelling |
ae20ce1b-c1db-43e0-9141-5dad16066b41-15a87d060-3b17-47a4-be47-7b9f4083cc6e-1946286dd-28e3-4e8b-a7dd-8a90e3f0545c-1d6e50a7f-165c-4c00-8613-8c0f92059d7f-12020-05-25T23:56:04Z2020-05-25T23:56:04Z2018We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field can be jointly computed on encrypted data using an additively homomorphic encryption scheme. Our protocol is secure against malicious adversaries. To motivate and illustrate applications of this technique, we demonstrate an attack on a class of known protocols showing how to compromise location privacy of honest users by manipulating messages in protocols with additively homomorphic encryption. We demonstrate how to apply the technique in order to solve different problems in geometric applications. We evaluate our approach using a prototypical implementation. The results show that the added overhead of our approach is small compared to insecure outsourced multiplication. © 2018-IOS Press and the authors. All rights reserved.application/pdfhttps://doi.org/10.3233/JCS-1710850926227Xhttps://repository.urosario.edu.co/handle/10336/22313engIOS Press587No. 4557Journal of Computer SecurityVol. 26Journal of Computer Security, ISSN:0926227X, Vol.26, No.4 (2018); pp. 557-587https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050381101&doi=10.3233%2fJCS-171085&partnerID=40&md5=afd823371f931904181effa25de53889Abierto (Texto Completo)http://purl.org/coar/access_right/c_abf2instname:Universidad del Rosarioreponame:Repositorio Institucional EdocURData privacyGeometric applicationsHo-momorphic encryptionsHomomorphic Encryption SchemesLocation privacyMalicious adversariesPrivacy enhancing technologiesPrototypical implementationSecure multi-party computationCryptographyLocation privacyPrivacy-enhancing technologiesSecure multi-party computationAssuring BetterTimesarticleArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501Hallgren P.Kishore R.Ochoa M.Sabelfeld A.10336/22313oai:repository.urosario.edu.co:10336/223132022-05-02 07:37:20.356904https://repository.urosario.edu.coRepositorio institucional EdocURedocur@urosario.edu.co |
dc.title.spa.fl_str_mv |
Assuring BetterTimes |
title |
Assuring BetterTimes |
spellingShingle |
Assuring BetterTimes Data privacy Geometric applications Ho-momorphic encryptions Homomorphic Encryption Schemes Location privacy Malicious adversaries Privacy enhancing technologies Prototypical implementation Secure multi-party computation Cryptography Location privacy Privacy-enhancing technologies Secure multi-party computation |
title_short |
Assuring BetterTimes |
title_full |
Assuring BetterTimes |
title_fullStr |
Assuring BetterTimes |
title_full_unstemmed |
Assuring BetterTimes |
title_sort |
Assuring BetterTimes |
dc.subject.keyword.spa.fl_str_mv |
Data privacy Geometric applications Ho-momorphic encryptions Homomorphic Encryption Schemes Location privacy Malicious adversaries Privacy enhancing technologies Prototypical implementation Secure multi-party computation Cryptography Location privacy Privacy-enhancing technologies Secure multi-party computation |
topic |
Data privacy Geometric applications Ho-momorphic encryptions Homomorphic Encryption Schemes Location privacy Malicious adversaries Privacy enhancing technologies Prototypical implementation Secure multi-party computation Cryptography Location privacy Privacy-enhancing technologies Secure multi-party computation |
description |
We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field can be jointly computed on encrypted data using an additively homomorphic encryption scheme. Our protocol is secure against malicious adversaries. To motivate and illustrate applications of this technique, we demonstrate an attack on a class of known protocols showing how to compromise location privacy of honest users by manipulating messages in protocols with additively homomorphic encryption. We demonstrate how to apply the technique in order to solve different problems in geometric applications. We evaluate our approach using a prototypical implementation. The results show that the added overhead of our approach is small compared to insecure outsourced multiplication. © 2018-IOS Press and the authors. All rights reserved. |
publishDate |
2018 |
dc.date.created.spa.fl_str_mv |
2018 |
dc.date.accessioned.none.fl_str_mv |
2020-05-25T23:56:04Z |
dc.date.available.none.fl_str_mv |
2020-05-25T23:56:04Z |
dc.type.eng.fl_str_mv |
article |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.spa.spa.fl_str_mv |
Artículo |
dc.identifier.doi.none.fl_str_mv |
https://doi.org/10.3233/JCS-171085 |
dc.identifier.issn.none.fl_str_mv |
0926227X |
dc.identifier.uri.none.fl_str_mv |
https://repository.urosario.edu.co/handle/10336/22313 |
url |
https://doi.org/10.3233/JCS-171085 https://repository.urosario.edu.co/handle/10336/22313 |
identifier_str_mv |
0926227X |
dc.language.iso.spa.fl_str_mv |
eng |
language |
eng |
dc.relation.citationEndPage.none.fl_str_mv |
587 |
dc.relation.citationIssue.none.fl_str_mv |
No. 4 |
dc.relation.citationStartPage.none.fl_str_mv |
557 |
dc.relation.citationTitle.none.fl_str_mv |
Journal of Computer Security |
dc.relation.citationVolume.none.fl_str_mv |
Vol. 26 |
dc.relation.ispartof.spa.fl_str_mv |
Journal of Computer Security, ISSN:0926227X, Vol.26, No.4 (2018); pp. 557-587 |
dc.relation.uri.spa.fl_str_mv |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050381101&doi=10.3233%2fJCS-171085&partnerID=40&md5=afd823371f931904181effa25de53889 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.acceso.spa.fl_str_mv |
Abierto (Texto Completo) |
rights_invalid_str_mv |
Abierto (Texto Completo) http://purl.org/coar/access_right/c_abf2 |
dc.format.mimetype.none.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
IOS Press |
institution |
Universidad del Rosario |
dc.source.instname.spa.fl_str_mv |
instname:Universidad del Rosario |
dc.source.reponame.spa.fl_str_mv |
reponame:Repositorio Institucional EdocUR |
repository.name.fl_str_mv |
Repositorio institucional EdocUR |
repository.mail.fl_str_mv |
edocur@urosario.edu.co |
_version_ |
1814167665050124288 |