Skip to main content
Log in

Cheater-identifiable homomorphic secret sharing for outsourcing computations

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Homomorphic secret sharing (HSS) allows a dealer to share a secret x among m participants such that: (1) any unauthorized subset of the participants learns no information about x; and (2) every participant in an authorized subset can perform the computation of a function f on its share to obtain a partial result and these partial results suffice to recover f(x). In a multi-client multi-server setting, HSS can be used to outsource the computation of a function f on the dealer’s (clients’) private inputs and thus resolve one of the main security issues in outsourcing computation, i.e., the privacy of the client’s data. Tsaloli, Liang, and Mitrokotsa (ProvSec 2018) proposed a verifiable HSS (VHSS) model where the partial results of the servers can be verified, in order to resolve another main security issue in outsourcing computation, i.e., the integrity of the outsourced computation. They also constructed a VHSS scheme for computing the product of the dealers’ private inputs such that any proper subset of the servers learns no information about the private inputs. In this paper, we present an easy attack of their scheme with which even a single server is able to distinguish between two different sets of private inputs. We propose a new VHSS model and construct a new VHSS scheme for computing the same function. By properly choosing the parameters, our scheme allows cheater detection, cheater identification, robust decoding, and extremely fast verification and result decoding.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. http://magma.maths.usyd.edu.au/magma/.

References

Download references

Acknowledgements

The authors would like to thank the anonymous referees for the helpful comments. This work was supported by the National Natural Science Foundation of China under Grant 61602304.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liang Feng Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

He, Y., Zhang, L.F. Cheater-identifiable homomorphic secret sharing for outsourcing computations. J Ambient Intell Human Comput 11, 5103–5113 (2020). https://doi.org/10.1007/s12652-020-01814-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01814-5

Navigation