Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing
The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a gr...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2024-07 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Ma, Xirong Li, Chuan Hu, Yuchang Tao, Yunting Jiang, Yali Li, Yanbin Kong, Fanyu Ge, Chunpeng |
description | The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a growing concern regarding data leakage and misuse. Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud. However, the encryption and decryption routines of some HE schemes require considerable computational resources, presenting non-trivial work for clients. In this paper, we propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes. The protocol splits the original decryption into two routines, with the computationally intensive part executed remotely by the cloud. Its security relies on an invariant of the NTRU-search problem with a newly designed blinding key distribution. Cryptographic analyses are conducted to configure protocol parameters across varying security levels. Our experiments demonstrate that the proposed protocol achieves up to a \(67\%\) acceleration in the client's local decryption, accompanied by a \(50\%\) reduction in space usage. |
doi_str_mv | 10.48550/arxiv.2406.19964 |
format | Article |
fullrecord | <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2406_19964</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3074215418</sourcerecordid><originalsourceid>FETCH-LOGICAL-a528-bf1fb908ab7108f2f296e607e8ebc8363f08da47a36b62fa08156334268134143</originalsourceid><addsrcrecordid>eNotj19LwzAAxIMgOOY-gE8GfE7N_6aPUjcnTCa495K0iXRsTU2a4r693ebTcdxx3A-AB4IzroTAzzr8tmNGOZYZKQrJb8CMMkaQ4pTegUWMe4wxlTkVgs3Ax5etU7Bwm4boU6htA19tHU790PoOOh_gar1ERscp-AztqOsT6oONNoxt9w3Lg08NLP2xT8Pk78Gt04doF_86B7vVcleu0Wb79l6-bJAWVCHjiDMFVtrkBCtHHS2klTi3yppaMckcVo3muWbSSOo0VkRIxjiVijBOOJuDx-vshbXqQ3vU4VSdmasL89R4ujb64H-SjUO1n-i66VPFcM4pEZwo9gcSfFjd</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3074215418</pqid></control><display><type>article</type><title>Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing</title><source>arXiv.org</source><source>Free E- Journals</source><creator>Ma, Xirong ; Li, Chuan ; Hu, Yuchang ; Tao, Yunting ; Jiang, Yali ; Li, Yanbin ; Kong, Fanyu ; Ge, Chunpeng</creator><creatorcontrib>Ma, Xirong ; Li, Chuan ; Hu, Yuchang ; Tao, Yunting ; Jiang, Yali ; Li, Yanbin ; Kong, Fanyu ; Ge, Chunpeng</creatorcontrib><description>The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a growing concern regarding data leakage and misuse. Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud. However, the encryption and decryption routines of some HE schemes require considerable computational resources, presenting non-trivial work for clients. In this paper, we propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes. The protocol splits the original decryption into two routines, with the computationally intensive part executed remotely by the cloud. Its security relies on an invariant of the NTRU-search problem with a newly designed blinding key distribution. Cryptographic analyses are conducted to configure protocol parameters across varying security levels. Our experiments demonstrate that the proposed protocol achieves up to a \(67\%\) acceleration in the client's local decryption, accompanied by a \(50\%\) reduction in space usage.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2406.19964</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Cloud computing ; Computer Science - Cryptography and Security ; Cybersecurity ; Data processing ; Encryption ; Machine learning ; Outsourcing ; Privacy ; Routines</subject><ispartof>arXiv.org, 2024-07</ispartof><rights>2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,784,885,27925</link.rule.ids><backlink>$$Uhttps://doi.org/10.48550/arXiv.2406.19964$$DView paper in arXiv$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.1016/j.jisa.2024.103893$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink></links><search><creatorcontrib>Ma, Xirong</creatorcontrib><creatorcontrib>Li, Chuan</creatorcontrib><creatorcontrib>Hu, Yuchang</creatorcontrib><creatorcontrib>Tao, Yunting</creatorcontrib><creatorcontrib>Jiang, Yali</creatorcontrib><creatorcontrib>Li, Yanbin</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Ge, Chunpeng</creatorcontrib><title>Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing</title><title>arXiv.org</title><description>The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a growing concern regarding data leakage and misuse. Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud. However, the encryption and decryption routines of some HE schemes require considerable computational resources, presenting non-trivial work for clients. In this paper, we propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes. The protocol splits the original decryption into two routines, with the computationally intensive part executed remotely by the cloud. Its security relies on an invariant of the NTRU-search problem with a newly designed blinding key distribution. Cryptographic analyses are conducted to configure protocol parameters across varying security levels. Our experiments demonstrate that the proposed protocol achieves up to a \(67\%\) acceleration in the client's local decryption, accompanied by a \(50\%\) reduction in space usage.</description><subject>Cloud computing</subject><subject>Computer Science - Cryptography and Security</subject><subject>Cybersecurity</subject><subject>Data processing</subject><subject>Encryption</subject><subject>Machine learning</subject><subject>Outsourcing</subject><subject>Privacy</subject><subject>Routines</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GOX</sourceid><recordid>eNotj19LwzAAxIMgOOY-gE8GfE7N_6aPUjcnTCa495K0iXRsTU2a4r693ebTcdxx3A-AB4IzroTAzzr8tmNGOZYZKQrJb8CMMkaQ4pTegUWMe4wxlTkVgs3Ax5etU7Bwm4boU6htA19tHU790PoOOh_gar1ERscp-AztqOsT6oONNoxt9w3Lg08NLP2xT8Pk78Gt04doF_86B7vVcleu0Wb79l6-bJAWVCHjiDMFVtrkBCtHHS2klTi3yppaMckcVo3muWbSSOo0VkRIxjiVijBOOJuDx-vshbXqQ3vU4VSdmasL89R4ujb64H-SjUO1n-i66VPFcM4pEZwo9gcSfFjd</recordid><startdate>20240709</startdate><enddate>20240709</enddate><creator>Ma, Xirong</creator><creator>Li, Chuan</creator><creator>Hu, Yuchang</creator><creator>Tao, Yunting</creator><creator>Jiang, Yali</creator><creator>Li, Yanbin</creator><creator>Kong, Fanyu</creator><creator>Ge, Chunpeng</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20240709</creationdate><title>Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing</title><author>Ma, Xirong ; Li, Chuan ; Hu, Yuchang ; Tao, Yunting ; Jiang, Yali ; Li, Yanbin ; Kong, Fanyu ; Ge, Chunpeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a528-bf1fb908ab7108f2f296e607e8ebc8363f08da47a36b62fa08156334268134143</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cloud computing</topic><topic>Computer Science - Cryptography and Security</topic><topic>Cybersecurity</topic><topic>Data processing</topic><topic>Encryption</topic><topic>Machine learning</topic><topic>Outsourcing</topic><topic>Privacy</topic><topic>Routines</topic><toplevel>online_resources</toplevel><creatorcontrib>Ma, Xirong</creatorcontrib><creatorcontrib>Li, Chuan</creatorcontrib><creatorcontrib>Hu, Yuchang</creatorcontrib><creatorcontrib>Tao, Yunting</creatorcontrib><creatorcontrib>Jiang, Yali</creatorcontrib><creatorcontrib>Li, Yanbin</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Ge, Chunpeng</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ma, Xirong</au><au>Li, Chuan</au><au>Hu, Yuchang</au><au>Tao, Yunting</au><au>Jiang, Yali</au><au>Li, Yanbin</au><au>Kong, Fanyu</au><au>Ge, Chunpeng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing</atitle><jtitle>arXiv.org</jtitle><date>2024-07-09</date><risdate>2024</risdate><eissn>2331-8422</eissn><abstract>The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services. Accompanying this trend is a growing concern regarding data leakage and misuse. Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud. However, the encryption and decryption routines of some HE schemes require considerable computational resources, presenting non-trivial work for clients. In this paper, we propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes. The protocol splits the original decryption into two routines, with the computationally intensive part executed remotely by the cloud. Its security relies on an invariant of the NTRU-search problem with a newly designed blinding key distribution. Cryptographic analyses are conducted to configure protocol parameters across varying security levels. Our experiments demonstrate that the proposed protocol achieves up to a \(67\%\) acceleration in the client's local decryption, accompanied by a \(50\%\) reduction in space usage.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2406.19964</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2024-07 |
issn | 2331-8422 |
language | eng |
recordid | cdi_arxiv_primary_2406_19964 |
source | arXiv.org; Free E- Journals |
subjects | Cloud computing Computer Science - Cryptography and Security Cybersecurity Data processing Encryption Machine learning Outsourcing Privacy Routines |
title | Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T20%3A41%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Outsourced%20Decryption%20for%20FHE-based%20Privacy-preserving%20Cloud%20Computing&rft.jtitle=arXiv.org&rft.au=Ma,%20Xirong&rft.date=2024-07-09&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2406.19964&rft_dat=%3Cproquest_arxiv%3E3074215418%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3074215418&rft_id=info:pmid/&rfr_iscdi=true |