Skip to main content
Top

2018 | OriginalPaper | Chapter

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols

Authors : Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka

Published in: Provable Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Homomorphic encryption allows computation over encrypted data and can be used for delegating computation: data providers encrypt their data and send them to an aggregator, and then the aggregator performs computation for a receiver with the data kept secret. However, since the aggregator is merely the third party, it may be malicious, and particularly may submit a result of incorrect aggregation to the receiver. Ohara et al. (APKC2014) studied secure aggregation of time-series data while enabling the correctness of aggregation to be verified. However, they only provided a concrete construction in the smart metering system and only gave an intuitive argument of security. In this paper, we give general syntax of their scheme as verifiable homomorphic encryption (VHE) and introduce formal security definitions. Further, we formally prove that Ohara et al.’s VHE scheme satisfies our proposed security definitions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference El-Yahyaoui, A., El Kettani, M.D.E.C.: A verifiable fully homomorphic encryption scheme to secure big data in cloud computing. In: WINCOM, pp 1–5. IEEE (2017) El-Yahyaoui, A., El Kettani, M.D.E.C.: A verifiable fully homomorphic encryption scheme to secure big data in cloud computing. In: WINCOM, pp 1–5. IEEE (2017)
4.
go back to reference Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM Conference on Computer and Communications Security, pp. 844–855. ACM (2014) Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM Conference on Computer and Communications Security, pp. 844–855. ACM (2014)
7.
go back to reference Ohara, K., Sakai, Y., Yoshida, F., Iwamoto, M., Ohta, K.: Privacy-preserving smart metering with verifiability for both billing and energy management. In: AsiaPKC@AsiaCCS, pp. 23–32. ACM (2014) Ohara, K., Sakai, Y., Yoshida, F., Iwamoto, M., Ohta, K.: Privacy-preserving smart metering with verifiability for both billing and energy management. In: AsiaPKC@AsiaCCS, pp. 23–32. ACM (2014)
8.
go back to reference Tran, N.H., Pang, H., Deng, R.H.: Efficient verifiable computation of linear and quadratic functions over encrypted data. In: AsiaCCS, pp. 605–616. ACM (2016) Tran, N.H., Pang, H., Deng, R.H.: Efficient verifiable computation of linear and quadratic functions over encrypted data. In: AsiaCCS, pp. 605–616. ACM (2016)
Metadata
Title
Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols
Authors
Satoshi Yasuda
Yoshihiro Koseki
Yusuke Sakai
Fuyuki Kitagawa
Yutaka Kawai
Goichiro Hanaoka
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-01446-9_25

Premium Partner