Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1755688.1755695acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Securely outsourcing linear algebra computations

Published: 13 April 2010 Publication History

Abstract

We give improved protocols for the secure and private outsourcing of linear algebra computations, that enable a client to securely outsource expensive algebraic computations (like the multiplication of large matrices) to a remote server, such that the server learns nothing about the customer's private input or the result of the computation, and any attempted corruption of the answer by the server is detected with high probability. The computational work performed at the client is linear in the size of its input and does not require the client to locally carry out any expensive encryptions of such input. The computational burden on the server is proportional to the time complexity of the current practically used algorithms for solving the algebraic problem (e.g., proportional to n3 for multiplying two n x n matrices). The improvements we give are: (i) whereas the previous work required more than one remote server and assumed they do not collude, our solution works with a single server (but readily accommodates many, for improved performance); (ii) whereas the previous work required a server to carry out expensive cryptographic computations (e.g., homomorphic encryptions), our solution does not make use of any such expensive cryptographic primitives; and (iii) whereas in previous work collusion by the servers against the client revealed to them the client's inputs, our scheme is resistant to such collusion. As in previous work, we maintain the property that the scheme enables the client to detect any attempt by the server(s) at corruption of the answer, even when the attempt is collusive and coordinated among the servers.

References

[1]
M. Abadi, J. Feigenbaum, and J. Kilian. On hiding information from an oracle. In Proceedings of the nineteenth annual ACM conference on Theory of computing, pages 195--203. ACM Press, 1987.
[2]
Karl R. Abrahamson. Generalized string matching. SIAM J. Comput., 16(6):1039--1051, 1987.
[3]
M. J. Atallah, K. N. Pantazopoulos, J. Rice, and E. H. Spafford. Secure outsourcing of scientific computations. Advances in Computers, 54(6):215--272, 2001.
[4]
Mikhail J. Atallah and Jiangtao Li. Secure outsourcing of sequence comparisons. In International Journal of Information Security, pages 277--287, 2005.
[5]
P. Beguin and J. J. Quisquater. Fast server-aided rsa signatures secure against active attacks. In CRYPT0 95, pages 57--69, 1995.
[6]
David Benjamin and Mikhail J. Atallah. Private and cheating-free outsourcing of algebraic computations. In Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1--3, 2008, Fredericton, New Brunswick, Canada, pages 240--245, 2008.
[7]
A. Boettcher and S. M. Grudsky. Toeplitz Matrices, Asymptotic Linear Algebra, and Functional Analysis. Birkhauser, 2000.
[8]
Ran Canetti, Yuval Ishai, Ravi Kumar, Michael Reiter, Ronitt Rubinfeld, and Rebecca Wright. Selective private function evaluation with applications to private statistics. In Proceedings of the twentieth annual ACM symposium on Principles of distributed computing, pages 293--304. ACM Press, 2001.
[9]
Ivan Damgård and Mads Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In PKC '01: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, pages 119--136. Springer, 2001.
[10]
I. Damgård and Y. Ishai. Constant-round multiparty computation using a black-box pseudorandom generator. In Advances in Cryptology (CRYPT0 05), volume LNCS 3621, pages 378--394. Springer-Verlag, 2005.
[11]
Ivan Damgård and Yuval Ishai. Constant-round multiparty computation using a black-box pseudorandom generator. In Advances in Cryptology (CRYPT0 05), volume LNCS 3621, pages 378--394. Springer-Verlag, 2005.
[12]
W. Du and M. J. Atallah. Privacy-preserving cooperative statistical analysis. In Proc. 17th Annual Computer Security Applications Conference (ACSAC 01), pages 102--110, New Orleans, Louisiana, December 2001.
[13]
Wenliang Du and Michael T. Goodrich. Searching for high-value rare events with uncheatable grid computing. In Proc. ACNS, pages 122--137, 2005.
[14]
Wenliang Du, Jing Jia, Manish Mangal, and Mummoorthy Murugesan. Uncheatable grid computing. In Proc. ICDCS, pages 4--11, 2004.
[15]
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On private scalar product computation for privacy-prerving data mining. In The 7th Annual International Conference on Information Security and Cryptology (ICISC 2004), 2004.
[16]
Oded Goldreich. Foundations of Cryptography: Volume I Basic Tools. Cambridge University Press, 2001.
[17]
Oded Goldreich. Foundations of Cryptography: Volume II Basic Application. Cambridge University Press, 2004.
[18]
Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game. In Proceedings of the nineteenth annual ACM conference on Theory of computing, pages 218--229. ACM Press, 1987.
[19]
Susan Hohenberger and Anna Lysyanskaya. How to securely outsource cryptographic computations. In Theory of Cryptography Conference (TCC'05), volume 3378 of LNCS, pages 264--282, 2005.
[20]
Jonathan Katz and Rafail Ostrovsky. Round optimal secure two-party computation. In CRYPTO 04, 2004.
[21]
S. I. Kawamura and A. Shimbo. Fast server-aided secret computation protocols for modular exponentiation. IEEE Journal on Selected Areas in Communications, 11(5):778--784, 1993.
[22]
C. H. Lim and P. J. Lee. Security and performance of server-aided rsa computation protocols. In CRYPT0 95, pages 70--83, 1995.
[23]
Yehuda Lindell. Parallel coin-tossing and constant-round secure two-party computation. Lecture Notes in Computer Science, 2139:171--189, 2001.
[24]
Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella. Fairplay -- a secure two-party computation system. In Proceedings of Usenix Security, 2004.
[25]
T. Matsumoto, K. Kato, and H. Imai. Speeding up secret computations with insecure auxiliary devices. In CRYPT0 88, pages 497--506, 1988.
[26]
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology: EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 223--238. Springer, 1999.
[27]
B. Pfitzmann and M. Waidner. Attacks on protocols for server-aided rsa computations. In EUROCRYPT 92, pages 153--162, 1992.
[28]
R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. Foundations of Secure Computation, pages 169--177, 1978.
[29]
Tomas Sander, Adam Young, and Moti Yung. Non-interactive cryptocomputing for NC1. In 40th Annual Symposium on Foundations of Computer Science, pages 554--566, 1999.
[30]
Adi Shamir. How to share a secret. Commun. ACM, 22(11):612--613, 1979.
[31]
Andrew C. Yao. Protocols for secure computation. In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pages 160--164, 1982.
[32]
Andrew C. Yao. How to generate and exchange secrets. In Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science, pages 162--167, 1986.

Cited By

View all
  • (2024)Corrigimus, verificamus, vincimus: Ensuring algorithmic accuracy in an age of uncertaintyProceedings of the 2024 International Symposium on Symbolic and Algebraic Computation10.1145/3666000.3672621(8-10)Online publication date: 16-Jul-2024
  • (2024)How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the CloudIEEE Transactions on Cloud Computing10.1109/TCC.2024.340824012:3(913-927)Online publication date: Jul-2024
  • (2024)A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart ContractsIEEE Transactions on Cloud Computing10.1109/TCC.2023.333784812:1(70-83)Online publication date: Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
April 2010
363 pages
ISBN:9781605589367
DOI:10.1145/1755688
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. computational outsourcing
  2. cryptographic protocols
  3. privacy

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '10
Sponsor:

Acceptance Rates

ASIACCS '10 Paper Acceptance Rate 25 of 166 submissions, 15%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)6
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Corrigimus, verificamus, vincimus: Ensuring algorithmic accuracy in an age of uncertaintyProceedings of the 2024 International Symposium on Symbolic and Algebraic Computation10.1145/3666000.3672621(8-10)Online publication date: 16-Jul-2024
  • (2024)How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the CloudIEEE Transactions on Cloud Computing10.1109/TCC.2024.340824012:3(913-927)Online publication date: Jul-2024
  • (2024)A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart ContractsIEEE Transactions on Cloud Computing10.1109/TCC.2023.333784812:1(70-83)Online publication date: Jan-2024
  • (2024)Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2024.340028711:16(27687-27699)Online publication date: 15-Aug-2024
  • (2023)Enhancing Privacy Preservation in Verifiable Computation through Random Permutation Masking to Prevent LeakageInformation10.3390/info1411060314:11(603)Online publication date: 6-Nov-2023
  • (2023)Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS)10.1109/ICPADS60453.2023.00337(2531-2538)Online publication date: 17-Dec-2023
  • (2023)Secure Outsourcing of Boolean Formulas Truth Assignment Problem2023 IEEE Conference on Dependable and Secure Computing (DSC)10.1109/DSC61021.2023.10354147(1-5)Online publication date: 7-Nov-2023
  • (2022)Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart GridsSensors10.3390/s2212436522:12(4365)Online publication date: 9-Jun-2022
  • (2022)Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix FactorizationIEEE Transactions on Services Computing10.1109/TSC.2019.293748415:1(266-278)Online publication date: 1-Jan-2022
  • (2022)Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoTIEEE Internet of Things Journal10.1109/JIOT.2022.31509569:17(15915-15927)Online publication date: 1-Sep-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media