Two-cloud-servers-assisted secure outsourcing multiparty computation

10Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. © 2014 Yi Sun et al.

Cite

CITATION STYLE

APA

Sun, Y., Wen, Q., Zhang, Y., Zhang, H., Jin, Z., & Li, W. (2014). Two-cloud-servers-assisted secure outsourcing multiparty computation. Scientific World Journal, 2014. https://doi.org/10.1155/2014/413265

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free