With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses ...With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses privacy and security challenges.Such challenges can be solved using secure multi-party computation(SMPC),but this still exposes more security issues.In cloud computing using SMPC,clients need to process their data and submit the processed data to the cloud server,which then performs the calculation and returns the results to each client.Each client and server must be honest.If there is cooperation or dishonest behavior between clients,some clients may profit from it or even disclose the private data of other clients.This paper proposes the SMPC based on a Partially-Homomorphic Encryption(PHE)scheme in which an addition homomorphic encryption algorithm with a lower computational cost is used to ensure data comparability and Zero-Knowledge Proof(ZKP)is used to limit the client’s malicious behavior.In addition,the introduction of Oblivious Transfer(OT)technology also ensures that the semi-honest cloud server knows nothing about private data,so that the cloud server of this scheme can calculate the correct data in the case of malicious participant models and safely return the calculation results to each client.Finally,the security analysis shows that the scheme not only ensures the privacy of participants,but also ensures the fairness of the comparison protocol data.展开更多
Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the ...Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP.展开更多
As a widely-used machine-learning classifier,a decision tree model can be trained and deployed at a service provider to provide classification services for clients,e.g.,remote diagnostics.To address privacy concerns r...As a widely-used machine-learning classifier,a decision tree model can be trained and deployed at a service provider to provide classification services for clients,e.g.,remote diagnostics.To address privacy concerns regarding the sensitive information in these services(i.e.,the clients’inputs,model parameters,and classification results),we propose a privacy-preserving decision tree classification scheme(PDTC)in this paper.Specifically,we first tailor an additively homomorphic encryption primitive and a secret sharing technique to design a new secure two-party comparison protocol,where the numeric inputs of each party can be privately compared as a whole instead of doing that in a bit-by-bit manner.Then,based on the comparison protocol,we exploit the structure of the decision tree to construct PDTC,where the input of a client and the model parameters of a service provider are concealed from the counterparty and the classification result is only revealed to the client.A formal simulation-based security model and the security proof demonstrate that PDTC achieves desirable security properties.In addition,performance evaluation shows that PDTC achieves a lower communication and computation overhead compared with existing schemes.展开更多
基金supported by the National Natural Science Foundation of China under Grant No.(62202118.61962009)And in part by Natural Science Foundation of Shandong Province(ZR2021MF086)+1 种基金And in part by Top Technology Talent Project from Guizhou Education Department(Qian jiao ji[2022]073)And in part by Foundation of Guangxi Key Laboratory of Cryptography and Information Security(GCIS202118).
文摘With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses privacy and security challenges.Such challenges can be solved using secure multi-party computation(SMPC),but this still exposes more security issues.In cloud computing using SMPC,clients need to process their data and submit the processed data to the cloud server,which then performs the calculation and returns the results to each client.Each client and server must be honest.If there is cooperation or dishonest behavior between clients,some clients may profit from it or even disclose the private data of other clients.This paper proposes the SMPC based on a Partially-Homomorphic Encryption(PHE)scheme in which an addition homomorphic encryption algorithm with a lower computational cost is used to ensure data comparability and Zero-Knowledge Proof(ZKP)is used to limit the client’s malicious behavior.In addition,the introduction of Oblivious Transfer(OT)technology also ensures that the semi-honest cloud server knows nothing about private data,so that the cloud server of this scheme can calculate the correct data in the case of malicious participant models and safely return the calculation results to each client.Finally,the security analysis shows that the scheme not only ensures the privacy of participants,but also ensures the fairness of the comparison protocol data.
基金Supported by National Natural Science Foundation of China under Grant No.61402407
文摘Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP.
基金The associate editor coordinating the review of this paper and approving it for publication was X.Cheng。
文摘As a widely-used machine-learning classifier,a decision tree model can be trained and deployed at a service provider to provide classification services for clients,e.g.,remote diagnostics.To address privacy concerns regarding the sensitive information in these services(i.e.,the clients’inputs,model parameters,and classification results),we propose a privacy-preserving decision tree classification scheme(PDTC)in this paper.Specifically,we first tailor an additively homomorphic encryption primitive and a secret sharing technique to design a new secure two-party comparison protocol,where the numeric inputs of each party can be privately compared as a whole instead of doing that in a bit-by-bit manner.Then,based on the comparison protocol,we exploit the structure of the decision tree to construct PDTC,where the input of a client and the model parameters of a service provider are concealed from the counterparty and the classification result is only revealed to the client.A formal simulation-based security model and the security proof demonstrate that PDTC achieves desirable security properties.In addition,performance evaluation shows that PDTC achieves a lower communication and computation overhead compared with existing schemes.