Assuring BetterTimes

We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field can be jointly computed on encrypted data using an additively homomorphic encryption scheme. Our protocol is secure against malicious adversaries. To moti...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2018
Institución:
Universidad del Rosario
Repositorio:
Repositorio EdocUR - U. Rosario
Idioma:
eng
OAI Identifier:
oai:repository.urosario.edu.co:10336/22313
Acceso en línea:
https://doi.org/10.3233/JCS-171085
https://repository.urosario.edu.co/handle/10336/22313
Palabra clave:
Data privacy
Geometric applications
Ho-momorphic encryptions
Homomorphic Encryption Schemes
Location privacy
Malicious adversaries
Privacy enhancing technologies
Prototypical implementation
Secure multi-party computation
Cryptography
Location privacy
Privacy-enhancing technologies
Secure multi-party computation
Rights
License
Abierto (Texto Completo)
id EDOCUR2_7e3b08ba3120301277bbd7e07662760a
oai_identifier_str oai:repository.urosario.edu.co:10336/22313
network_acronym_str EDOCUR2
network_name_str Repositorio EdocUR - U. Rosario
repository_id_str
spelling ae20ce1b-c1db-43e0-9141-5dad16066b41-15a87d060-3b17-47a4-be47-7b9f4083cc6e-1946286dd-28e3-4e8b-a7dd-8a90e3f0545c-1d6e50a7f-165c-4c00-8613-8c0f92059d7f-12020-05-25T23:56:04Z2020-05-25T23:56:04Z2018We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field can be jointly computed on encrypted data using an additively homomorphic encryption scheme. Our protocol is secure against malicious adversaries. To motivate and illustrate applications of this technique, we demonstrate an attack on a class of known protocols showing how to compromise location privacy of honest users by manipulating messages in protocols with additively homomorphic encryption. We demonstrate how to apply the technique in order to solve different problems in geometric applications. We evaluate our approach using a prototypical implementation. The results show that the added overhead of our approach is small compared to insecure outsourced multiplication. © 2018-IOS Press and the authors. All rights reserved.application/pdfhttps://doi.org/10.3233/JCS-1710850926227Xhttps://repository.urosario.edu.co/handle/10336/22313engIOS Press587No. 4557Journal of Computer SecurityVol. 26Journal of Computer Security, ISSN:0926227X, Vol.26, No.4 (2018); pp. 557-587https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050381101&doi=10.3233%2fJCS-171085&partnerID=40&md5=afd823371f931904181effa25de53889Abierto (Texto Completo)http://purl.org/coar/access_right/c_abf2instname:Universidad del Rosarioreponame:Repositorio Institucional EdocURData privacyGeometric applicationsHo-momorphic encryptionsHomomorphic Encryption SchemesLocation privacyMalicious adversariesPrivacy enhancing technologiesPrototypical implementationSecure multi-party computationCryptographyLocation privacyPrivacy-enhancing technologiesSecure multi-party computationAssuring BetterTimesarticleArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501Hallgren P.Kishore R.Ochoa M.Sabelfeld A.10336/22313oai:repository.urosario.edu.co:10336/223132022-05-02 07:37:20.356904https://repository.urosario.edu.coRepositorio institucional EdocURedocur@urosario.edu.co
dc.title.spa.fl_str_mv Assuring BetterTimes
title Assuring BetterTimes
spellingShingle Assuring BetterTimes
Data privacy
Geometric applications
Ho-momorphic encryptions
Homomorphic Encryption Schemes
Location privacy
Malicious adversaries
Privacy enhancing technologies
Prototypical implementation
Secure multi-party computation
Cryptography
Location privacy
Privacy-enhancing technologies
Secure multi-party computation
title_short Assuring BetterTimes
title_full Assuring BetterTimes
title_fullStr Assuring BetterTimes
title_full_unstemmed Assuring BetterTimes
title_sort Assuring BetterTimes
dc.subject.keyword.spa.fl_str_mv Data privacy
Geometric applications
Ho-momorphic encryptions
Homomorphic Encryption Schemes
Location privacy
Malicious adversaries
Privacy enhancing technologies
Prototypical implementation
Secure multi-party computation
Cryptography
Location privacy
Privacy-enhancing technologies
Secure multi-party computation
topic Data privacy
Geometric applications
Ho-momorphic encryptions
Homomorphic Encryption Schemes
Location privacy
Malicious adversaries
Privacy enhancing technologies
Prototypical implementation
Secure multi-party computation
Cryptography
Location privacy
Privacy-enhancing technologies
Secure multi-party computation
description We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field can be jointly computed on encrypted data using an additively homomorphic encryption scheme. Our protocol is secure against malicious adversaries. To motivate and illustrate applications of this technique, we demonstrate an attack on a class of known protocols showing how to compromise location privacy of honest users by manipulating messages in protocols with additively homomorphic encryption. We demonstrate how to apply the technique in order to solve different problems in geometric applications. We evaluate our approach using a prototypical implementation. The results show that the added overhead of our approach is small compared to insecure outsourced multiplication. © 2018-IOS Press and the authors. All rights reserved.
publishDate 2018
dc.date.created.spa.fl_str_mv 2018
dc.date.accessioned.none.fl_str_mv 2020-05-25T23:56:04Z
dc.date.available.none.fl_str_mv 2020-05-25T23:56:04Z
dc.type.eng.fl_str_mv article
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.spa.spa.fl_str_mv Artículo
dc.identifier.doi.none.fl_str_mv https://doi.org/10.3233/JCS-171085
dc.identifier.issn.none.fl_str_mv 0926227X
dc.identifier.uri.none.fl_str_mv https://repository.urosario.edu.co/handle/10336/22313
url https://doi.org/10.3233/JCS-171085
https://repository.urosario.edu.co/handle/10336/22313
identifier_str_mv 0926227X
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.citationEndPage.none.fl_str_mv 587
dc.relation.citationIssue.none.fl_str_mv No. 4
dc.relation.citationStartPage.none.fl_str_mv 557
dc.relation.citationTitle.none.fl_str_mv Journal of Computer Security
dc.relation.citationVolume.none.fl_str_mv Vol. 26
dc.relation.ispartof.spa.fl_str_mv Journal of Computer Security, ISSN:0926227X, Vol.26, No.4 (2018); pp. 557-587
dc.relation.uri.spa.fl_str_mv https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050381101&doi=10.3233%2fJCS-171085&partnerID=40&md5=afd823371f931904181effa25de53889
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.acceso.spa.fl_str_mv Abierto (Texto Completo)
rights_invalid_str_mv Abierto (Texto Completo)
http://purl.org/coar/access_right/c_abf2
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv IOS Press
institution Universidad del Rosario
dc.source.instname.spa.fl_str_mv instname:Universidad del Rosario
dc.source.reponame.spa.fl_str_mv reponame:Repositorio Institucional EdocUR
repository.name.fl_str_mv Repositorio institucional EdocUR
repository.mail.fl_str_mv edocur@urosario.edu.co
_version_ 1808391013978341376