Skip to main content
Top

2021 | OriginalPaper | Chapter

Blockchain-Based Secure Outsourcing of Fully Homomorphic Encryption Using Hidden Ideal Lattice

Authors : Mingyang Song, Yingpeng Sang, Yuying Zeng, Shunchao Luo

Published in: Parallel and Distributed Computing, Applications and Technologies

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The efficiency of homomorphic encryption has always affected its practicality. With the dawn of internet of things, the demand for computation and encryption on lightweight devices is increasing. Complex cryptographic computing is an important burden for lightweight devices, but outsourcing provides great convenience for them. In this paper, based on blockchain, we propose a secure outsourcing scheme for Fully Homomorphic Encryption using Hidden Ideal Lattice (FHEHIL), in which the time-consuming operations (including modular exponentiation and polynomial multiplication) are outsourced. For polynomial multiplication, we propose a secure outsourcing algorithm that reduces the local computation cost to \(O\left(n\right)\). Previous work based on Fast Fourier Transform can only achieve \(O\left(nlog(n)\right)\) for the local cost. Through security analysis, our scheme achieves the goals of privacy protection against passive attackers and cheating detection against active attackers. Experiments also demonstrate our scheme is more efficient in comparison with the non-outsourcing FHEHIL.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Thomas, T., Willy, S., Zhenfei, Z.: Fully homomorphic encryption using hidden ideal lattice. IEEE Trans. Inf. Forensics Secur. 8(12), 2127–2137 (2013)CrossRef Thomas, T., Willy, S., Zhenfei, Z.: Fully homomorphic encryption using hidden ideal lattice. IEEE Trans. Inf. Forensics Secur. 8(12), 2127–2137 (2013)CrossRef
6.
go back to reference Zhou, Q., Tian, C., Zhang, H., Yu, J., Li, F.: How to securely outsource the extended Euclidean algorithm for large-scale polynomial over finite fields. Inf. Sci. 512, 641–660 (2020)MathSciNetCrossRef Zhou, Q., Tian, C., Zhang, H., Yu, J., Li, F.: How to securely outsource the extended Euclidean algorithm for large-scale polynomial over finite fields. Inf. Sci. 512, 641–660 (2020)MathSciNetCrossRef
8.
go back to reference Fei, C., Tao, X., Yuanyuan, Y.: Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74(3), 2141–2151 (2014)CrossRef Fei, C., Tao, X., Yuanyuan, Y.: Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74(3), 2141–2151 (2014)CrossRef
9.
go back to reference Anmin, F., Shuai, L., Shui, Y., Yuqing, Z., Yinxia, S.: Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server. J. Netw. Comput. Appl. 118, 102–112 (2018)CrossRef Anmin, F., Shuai, L., Shui, Y., Yuqing, Z., Yinxia, S.: Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server. J. Netw. Comput. Appl. 118, 102–112 (2018)CrossRef
12.
go back to reference Zvika, B., Vinod, V.: Efficient fully homomorphic encryption from (standard) LEW. SIAM J. Comput. 43(2), 831–871 (2014)MathSciNetCrossRef Zvika, B., Vinod, V.: Efficient fully homomorphic encryption from (standard) LEW. SIAM J. Comput. 43(2), 831–871 (2014)MathSciNetCrossRef
14.
go back to reference Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)CrossRef Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)CrossRef
15.
go back to reference Ren, Y., Ding, N., Zhang, X., Lu, H., Gu, D.: Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: ASIA CCS 2016: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 293–303. ACM (2016) Ren, Y., Ding, N., Zhang, X., Lu, H., Gu, D.: Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: ASIA CCS 2016: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 293–303. ACM (2016)
16.
go back to reference Zang, Y., Deng, R.H., Liu, X., et al.: Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462, 262–277 (2018)MathSciNetCrossRef Zang, Y., Deng, R.H., Liu, X., et al.: Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462, 262–277 (2018)MathSciNetCrossRef
17.
go back to reference Wang, H., Wang, X.A., Wang, W., Xiao, S.: A basic framework of blockchain-based decentralized verifiable outsourcing. In: Barolli, L., Nishino, H., Miwa, H. (eds.) Advances in Intelligent Networking and Collaborative Systems, INCoS 2019. Advances in Intelligent Systems and Computing, pp. 415–421, vol. 1035. Springer, Cham. https://doi.org/10.1007/978-3-030-29035-1_40 Wang, H., Wang, X.A., Wang, W., Xiao, S.: A basic framework of blockchain-based decentralized verifiable outsourcing. In: Barolli, L., Nishino, H., Miwa, H. (eds.) Advances in Intelligent Networking and Collaborative Systems, INCoS 2019. Advances in Intelligent Systems and Computing, pp. 415–421, vol. 1035. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-29035-1_​40
Metadata
Title
Blockchain-Based Secure Outsourcing of Fully Homomorphic Encryption Using Hidden Ideal Lattice
Authors
Mingyang Song
Yingpeng Sang
Yuying Zeng
Shunchao Luo
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-69244-5_13

Premium Partner