Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2018, Vol. 58 Issue (2) : 143-149     DOI: 10.16511/j.cnki.qhdxxb.2018.26.009
COMPUTER SCIENCE AND TECHNOLOGY |
Multi-user fully homomorphic encryption scheme based on proxy re-encryption for cloud computing
LI Taoshen1,2, LIU Qing1, HUANG Ruwei1,2
1. School of Computer, Electronics and Information, Guangxi University, Nanning 530004, China;
2. Guangxi Colleges and Universities Key Laboratory of Parallel and Distributed Computing, Nanning 530004, China
Download: PDF(1284 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Cloud computing involves multi-user sharing, user privacy and security, and ciphertext evaluation. This paper presents a multi-user, fully homomorphic encryption scheme based on proxy re-encryption for cloud computing. The scheme uses different public keys to encrypt the ciphertexts of different users, so different user ciphertexts provide ciphertext independence and indiscernibility. When a ciphertext is uploaded to the cloud, the ciphertext of one user is re-encrypted by the cloud service provider (CPS) as the agent and converted into a ciphertext for the same user. This allows the ciphertext calculation between the two users to meet the fully homomorphic computing requirements. A security analysis shows that the security of the this scheme is based on the harder problem of learning with errors (LWE) and can resist the chosen plaintext attack (in the generic bilinear group radom oracal model). Tests show that this scheme efficiently implements fully homomorphic evaluations of different user ciphertexts and supports multi-user sharing.
Keywords cloud computing      fully homomorphic encryption      multi-user      proxy      ciphertext re-encryption     
ZTFLH:  TP309.7  
Issue Date: 15 February 2018
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
LI Taoshen
LIU Qing
HUANG Ruwei
Cite this article:   
LI Taoshen,LIU Qing,HUANG Ruwei. Multi-user fully homomorphic encryption scheme based on proxy re-encryption for cloud computing[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 143-149.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2018.26.009     OR     http://jst.tsinghuajournals.com/EN/Y2018/V58/I2/143
  
  
  
  
  
  
  
[1] BÉLEN C Z, LUIS F A J, AMBROSIO T. Security in cloud computing:A mapping study[J]. Computer Science and Information Systems, 2015, 12(1):161-184.
[2] LIANG K T, LIU J K, WONG D S, et al. An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing[C]//Proceedings of the 19th European Symposium on Research in Computer Security. Wroclaw, Poland:Springer Press, 2014:257-272.
[3] YANG K, JIA X H, REN K, et al. DAC-MACS:Effective data access control for multiauthority cloud storage systems[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(11):1790-1801.
[4] 张玉清, 王晓菲, 刘雪峰, 等. 云计算环境安全综述[J]. 软件学报, 2016, 27(6):1328-1348. ZHANG Y Q, WANG X F, LIU X F, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6):1328-1348. (in Chinese)
[5] STRIZHOV M, RAY I. Secure multi-keyword similarity search over encrypted cloud data supporting efficient multi-user setup[J]. Transactions on Data Privacy, 2016, 9(2):131-159.
[6] GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. Bethesda, USA:ACM Press, 2009:169-178.
[7] CORON J S, NACCACHE D, TIBOUCHI M. Public key compression and modulus switching for fully homomorphic encryption over the integers[C]//Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques. Cambridge, UK:Springer Press, 2012:446-464.
[8] CHEON J H, KIM J, LEE M S, et al. CRT-based fully homomorphic encryption over the integers[J]. Information Sciences, 2015, 310:149-162.
url: http://dx.doi.org/10.1016/j.ins.2015.03.019
[9] BRAKERSKI Z, VAIKUNTANATHAN V. Efficient fully homomorphic encryption from (standard) LWE[C]//Proceedings of the 52nd Annual Symposium on Foundations of Computer Science. Palm Springs, USA:IEEE Press, 2011:97-106.
[10] BOS J W, LAUTER K, LOFTUS J, et al. Improved security for a ring-based fully homomorphic encryption scheme[C]//Proceedings of the 14th IMA International Conference on Cryptography and Coding. Oxford, UK:Springer Press, 2013:45-64.
[11] REGEV O. On lattices, learning with errors, random linear codes, and cryptography[C]//Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing. Baltimore, USA:ACM Press, 2005:84-93.
[12] GENTRY C, SAHAI A, WATERS B. Homomorphic encryption from learning with errors:Conceptually-simpler, asymptotically-faster, attribute-based[C]//Proceedings of the 33rd Annual Cryptology Conference. Santa Barbara, USA:Springer Press, 2013:75-92.
[13] CLEAR M, HUGHES A, TEWARI H. Homomorphic encryption with access policies:Characterization and new constructions[C]//Proceedings of the 6th International Conference on Cryptology in Africa. Cairo, Egypt:Springer Press, 2013:61-87.
[14] CLEAR M, MCGOLDRICK C. Policy-based non-interactive outsourcing of computation using multikey FHE and CP-ABE[C]//Proceedings of 2013 International Conference on Security and Cryptography. Reykjavik, Iceland:IEEE Press, 2013:1-9.
[15] CLEAR M, MCGOLDRICK C. Multi-identity and multi-key leveled FHE from learning with errors[C]//Proceedings of the 35th Annual Cryptology Conference. Santa Barbara, USA:Springer Press, 2015:630-656.
[16] LI T, YE X J, WANG J M. Protecting data confidentiality in cloud systems[C]//Proceedings of the 4th Asia-Pacific Symposium on Internetware. Qingdao, China:ACM Press, 2012:Article No. 18.
[17] LÓPEZ-ALT A, TROME E, VAIKUNTANATHAN V. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption[C]//Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing. New York, USA:ACM Press, 2012:1219-1234.
[18] 刘青, 李陶深, 黄汝维. 云计算环境中基于策略的多用户全同态加密方法[J]. 广西大学学报(自然科学版), 2016, 41(3):786-795. LIU Q, LI T S, HUANG R W. Policy-based multi-user full homomorphic encryption method in cloud computing[J]. Journal of Guangxi University (Natural Science Edition), 2016, 41(3):786-795. (in Chinese)
[1] CAO Laicheng, LI Yuntao, WU Rong, GUO Xian, FENG Tao. Multi-key privacy protection decision tree evaluation scheme[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 862-870.
[2] LI Qing, FAN Yiping, LI Dachuan, JIANG Xin, LIU Enyu, CHEN Jia. Architecture of a microservice-based flight management system simulation[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(7): 589-596.
[3] WANG Kai, LIU Ronghua, WEI Jiahua, LIU Qi, WANG Guangqian. Model integration methods in the hydro-modeling platform (HydroMP) based on cloud computing[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(12): 1006-1015.
[4] CAO Laicheng, LIU Yufei, DONG Xiaoye, GUO Xian. User privacy-preserving cloud storage scheme on CP-ABE[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 150-156.
[5] LIU Jinzhao, ZHOU Yuezhi, ZHANG Yaoxue. Wavelet-based approach for anomaly detection of online services in cloud computing systems[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(5): 550-554.
[6] LI Yu, ZHAO Yong, GUO Xiaodong, LIU Guole. An assurance model for accesscontrol on cloud computing systems[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(4): 432-436.
[7] WANG Yuding, YANG Jiahai. Data access control model based on data's role and attributes for cloud computing[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1150-1158.
[8] LIU Yang, WEI Wei. Fast Nash bargaining algorithm for resource scheduling problems with a large number of media streaming channels[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(10): 1056-1062.
[9] Ronghua LIU, Jiahua WEI, Yanzhang WENG, Guangqian WANG, Shuang TANG. HydroMP: A cloud computing based platform for hydraulic modeling and simulation service[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 575-583.
[10] Zhihua WANG, Haibo PANG, Zhanbo LI. Access control for Hadoop-based cloud computing[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(1): 53-59.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd