Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing

The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a gr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2024-07
Hauptverfasser: Ma, Xirong, Li, Chuan, Hu, Yuchang, Tao, Yunting, Jiang, Yali, Li, Yanbin, Kong, Fanyu, Ge, Chunpeng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Ma, Xirong
Li, Chuan
Hu, Yuchang
Tao, Yunting
Jiang, Yali
Li, Yanbin
Kong, Fanyu
Ge, Chunpeng
description The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a growing concern regarding data leakage and misuse. Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud. However, the encryption and decryption routines of some HE schemes require considerable computational resources, presenting non-trivial work for clients. In this paper, we propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes. The protocol splits the original decryption into two routines, with the computationally intensive part executed remotely by the cloud. Its security relies on an invariant of the NTRU-search problem with a newly designed blinding key distribution. Cryptographic analyses are conducted to configure protocol parameters across varying security levels. Our experiments demonstrate that the proposed protocol achieves up to a \(67\%\) acceleration in the client's local decryption, accompanied by a \(50\%\) reduction in space usage.
doi_str_mv 10.48550/arxiv.2406.19964
format Article
fullrecord <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2406_19964</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3074215418</sourcerecordid><originalsourceid>FETCH-LOGICAL-a528-bf1fb908ab7108f2f296e607e8ebc8363f08da47a36b62fa08156334268134143</originalsourceid><addsrcrecordid>eNotj19LwzAAxIMgOOY-gE8GfE7N_6aPUjcnTCa495K0iXRsTU2a4r693ebTcdxx3A-AB4IzroTAzzr8tmNGOZYZKQrJb8CMMkaQ4pTegUWMe4wxlTkVgs3Ax5etU7Bwm4boU6htA19tHU790PoOOh_gar1ERscp-AztqOsT6oONNoxt9w3Lg08NLP2xT8Pk78Gt04doF_86B7vVcleu0Wb79l6-bJAWVCHjiDMFVtrkBCtHHS2klTi3yppaMckcVo3muWbSSOo0VkRIxjiVijBOOJuDx-vshbXqQ3vU4VSdmasL89R4ujb64H-SjUO1n-i66VPFcM4pEZwo9gcSfFjd</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3074215418</pqid></control><display><type>article</type><title>Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing</title><source>arXiv.org</source><source>Free E- Journals</source><creator>Ma, Xirong ; Li, Chuan ; Hu, Yuchang ; Tao, Yunting ; Jiang, Yali ; Li, Yanbin ; Kong, Fanyu ; Ge, Chunpeng</creator><creatorcontrib>Ma, Xirong ; Li, Chuan ; Hu, Yuchang ; Tao, Yunting ; Jiang, Yali ; Li, Yanbin ; Kong, Fanyu ; Ge, Chunpeng</creatorcontrib><description>The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a growing concern regarding data leakage and misuse. Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud. However, the encryption and decryption routines of some HE schemes require considerable computational resources, presenting non-trivial work for clients. In this paper, we propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes. The protocol splits the original decryption into two routines, with the computationally intensive part executed remotely by the cloud. Its security relies on an invariant of the NTRU-search problem with a newly designed blinding key distribution. Cryptographic analyses are conducted to configure protocol parameters across varying security levels. Our experiments demonstrate that the proposed protocol achieves up to a \(67\%\) acceleration in the client's local decryption, accompanied by a \(50\%\) reduction in space usage.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2406.19964</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Cloud computing ; Computer Science - Cryptography and Security ; Cybersecurity ; Data processing ; Encryption ; Machine learning ; Outsourcing ; Privacy ; Routines</subject><ispartof>arXiv.org, 2024-07</ispartof><rights>2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,784,885,27925</link.rule.ids><backlink>$$Uhttps://doi.org/10.48550/arXiv.2406.19964$$DView paper in arXiv$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.1016/j.jisa.2024.103893$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink></links><search><creatorcontrib>Ma, Xirong</creatorcontrib><creatorcontrib>Li, Chuan</creatorcontrib><creatorcontrib>Hu, Yuchang</creatorcontrib><creatorcontrib>Tao, Yunting</creatorcontrib><creatorcontrib>Jiang, Yali</creatorcontrib><creatorcontrib>Li, Yanbin</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Ge, Chunpeng</creatorcontrib><title>Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing</title><title>arXiv.org</title><description>The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a growing concern regarding data leakage and misuse. Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud. However, the encryption and decryption routines of some HE schemes require considerable computational resources, presenting non-trivial work for clients. In this paper, we propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes. The protocol splits the original decryption into two routines, with the computationally intensive part executed remotely by the cloud. Its security relies on an invariant of the NTRU-search problem with a newly designed blinding key distribution. Cryptographic analyses are conducted to configure protocol parameters across varying security levels. Our experiments demonstrate that the proposed protocol achieves up to a \(67\%\) acceleration in the client's local decryption, accompanied by a \(50\%\) reduction in space usage.</description><subject>Cloud computing</subject><subject>Computer Science - Cryptography and Security</subject><subject>Cybersecurity</subject><subject>Data processing</subject><subject>Encryption</subject><subject>Machine learning</subject><subject>Outsourcing</subject><subject>Privacy</subject><subject>Routines</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GOX</sourceid><recordid>eNotj19LwzAAxIMgOOY-gE8GfE7N_6aPUjcnTCa495K0iXRsTU2a4r693ebTcdxx3A-AB4IzroTAzzr8tmNGOZYZKQrJb8CMMkaQ4pTegUWMe4wxlTkVgs3Ax5etU7Bwm4boU6htA19tHU790PoOOh_gar1ERscp-AztqOsT6oONNoxt9w3Lg08NLP2xT8Pk78Gt04doF_86B7vVcleu0Wb79l6-bJAWVCHjiDMFVtrkBCtHHS2klTi3yppaMckcVo3muWbSSOo0VkRIxjiVijBOOJuDx-vshbXqQ3vU4VSdmasL89R4ujb64H-SjUO1n-i66VPFcM4pEZwo9gcSfFjd</recordid><startdate>20240709</startdate><enddate>20240709</enddate><creator>Ma, Xirong</creator><creator>Li, Chuan</creator><creator>Hu, Yuchang</creator><creator>Tao, Yunting</creator><creator>Jiang, Yali</creator><creator>Li, Yanbin</creator><creator>Kong, Fanyu</creator><creator>Ge, Chunpeng</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20240709</creationdate><title>Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing</title><author>Ma, Xirong ; Li, Chuan ; Hu, Yuchang ; Tao, Yunting ; Jiang, Yali ; Li, Yanbin ; Kong, Fanyu ; Ge, Chunpeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a528-bf1fb908ab7108f2f296e607e8ebc8363f08da47a36b62fa08156334268134143</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cloud computing</topic><topic>Computer Science - Cryptography and Security</topic><topic>Cybersecurity</topic><topic>Data processing</topic><topic>Encryption</topic><topic>Machine learning</topic><topic>Outsourcing</topic><topic>Privacy</topic><topic>Routines</topic><toplevel>online_resources</toplevel><creatorcontrib>Ma, Xirong</creatorcontrib><creatorcontrib>Li, Chuan</creatorcontrib><creatorcontrib>Hu, Yuchang</creatorcontrib><creatorcontrib>Tao, Yunting</creatorcontrib><creatorcontrib>Jiang, Yali</creatorcontrib><creatorcontrib>Li, Yanbin</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Ge, Chunpeng</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ma, Xirong</au><au>Li, Chuan</au><au>Hu, Yuchang</au><au>Tao, Yunting</au><au>Jiang, Yali</au><au>Li, Yanbin</au><au>Kong, Fanyu</au><au>Ge, Chunpeng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing</atitle><jtitle>arXiv.org</jtitle><date>2024-07-09</date><risdate>2024</risdate><eissn>2331-8422</eissn><abstract>The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a growing concern regarding data leakage and misuse. Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud. However, the encryption and decryption routines of some HE schemes require considerable computational resources, presenting non-trivial work for clients. In this paper, we propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes. The protocol splits the original decryption into two routines, with the computationally intensive part executed remotely by the cloud. Its security relies on an invariant of the NTRU-search problem with a newly designed blinding key distribution. Cryptographic analyses are conducted to configure protocol parameters across varying security levels. Our experiments demonstrate that the proposed protocol achieves up to a \(67\%\) acceleration in the client's local decryption, accompanied by a \(50\%\) reduction in space usage.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2406.19964</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2024-07
issn 2331-8422
language eng
recordid cdi_arxiv_primary_2406_19964
source arXiv.org; Free E- Journals
subjects Cloud computing
Computer Science - Cryptography and Security
Cybersecurity
Data processing
Encryption
Machine learning
Outsourcing
Privacy
Routines
title Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T20%3A41%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Outsourced%20Decryption%20for%20FHE-based%20Privacy-preserving%20Cloud%20Computing&rft.jtitle=arXiv.org&rft.au=Ma,%20Xirong&rft.date=2024-07-09&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2406.19964&rft_dat=%3Cproquest_arxiv%3E3074215418%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3074215418&rft_id=info:pmid/&rfr_iscdi=true