Abstract
Homomorphic secret sharing (HSS) allows a dealer to share a secret x among m participants such that: (1) any unauthorized subset of the participants learns no information about x; and (2) every participant in an authorized subset can perform the computation of a function f on its share to obtain a partial result and these partial results suffice to recover f(x). In a multi-client multi-server setting, HSS can be used to outsource the computation of a function f on the dealer’s (clients’) private inputs and thus resolve one of the main security issues in outsourcing computation, i.e., the privacy of the client’s data. Tsaloli, Liang, and Mitrokotsa (ProvSec 2018) proposed a verifiable HSS (VHSS) model where the partial results of the servers can be verified, in order to resolve another main security issue in outsourcing computation, i.e., the integrity of the outsourced computation. They also constructed a VHSS scheme for computing the product of the dealers’ private inputs such that any proper subset of the servers learns no information about the private inputs. In this paper, we present an easy attack of their scheme with which even a single server is able to distinguish between two different sets of private inputs. We propose a new VHSS model and construct a new VHSS scheme for computing the same function. By properly choosing the parameters, our scheme allows cheater detection, cheater identification, robust decoding, and extremely fast verification and result decoding.
Similar content being viewed by others
References
Ananth P, Chandran N, Goyal V, Kanukurthi B, Ostrovsky R (2014) Achieving privacy in verifiable computation with multiple servers—without the and without pre-processing. In: Proceedings of PKC 2014, Springer, Berlin, pp 149–166. https://doi.org/10.1007/978-3-642-54631-0_9
Backes M, Fiore D, Reischuk RM (2013) Verifiable delegation of computation on outsourced data. In: Proceedings of CCS 2013, ACM, New York, NY, pp 863–874. https://doi.org/10.1145/2508859.2516681
Barkol O, Ishai Y, Weinreb E (2010) On \(d\)-multiplicative secret sharing. J Cryptol 23(4):580–593. https://doi.org/10.1007/s00145-010-9056-z
Ben-Or M, Goldwasser S, Wigderson A (1988) Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of STOC 1988, ACM, New York, NY, pp 1–10. https://doi.org/10.1145/62212.62213
Benabbas S, Gennaro R, Vahlis Y (2011) Verifiable delegation of computation over large datasets. In: Proceedings of CRYPTO 2011, Springer, Berlin, pp 111–131. https://doi.org/10.1007/978-3-642-22792-9_7
Benaloh JC (1986) Secret sharing homomorphisms: keeping shares of a secret secret (extended abstract). In: Proceedings of CRYPTO 1986, Springer, Berlin, pp 251–260. https://doi.org/10.1007/3-540-47721-7_19
Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the 1979 international workshop on managing requirements knowledge, IEEE, New York, pp 313–317. https://doi.org/10.1109/MARK.1979.8817296
Boyle E, Gilboa N, Ishai Y (2015) Function secret sharing. In: Proceedings of EUROCRYPT 2015, Springer, Berlin, pp 337–367. https://doi.org/10.1007/978-3-662-46803-6_12
Boyle E, Gilboa N, Ishai Y (2016a) Breaking the circuit size barrier for secure computation under DDH. In: Proceedings of CRYPTO 2016, Springer, Berlin, pp 509–539. https://doi.org/10.1007/978-3-662-53018-4_19
Boyle E, Gilboa N, Ishai Y (2016b) Function secret sharing. In: Proceedings of CCS 2016, ACM, New York, NY, pp 1292–1303. https://doi.org/10.1145/2976749.2978429
Boyle E, Couteau G, Gilboa N, Ishai Y, Orrù M (2017a) Homomorphic secret sharing. In: Proceedings of CCS 2017, ACM, New York, NY, pp 2105–2122. https://doi.org/10.1145/3133956.3134107
Boyle E, Gilboa N, Ishai Y (2017b) Group-based secure computation: Optimizing rounds, communication, and computation. In: Proceedings of EUROCRYPT 2017, Springer, Berlin, pp 163–193. https://doi.org/10.1007/978-3-319-56614-6_6
Boyle E, Kohl L, Scholl P (2019) Homomorphic secret sharing from lattices without FHE. In: Proceedings of EUROCRYPT 2019, Springer, Berlin, pp 3–33. https://doi.org/10.1007/978-3-030-17656-3_1
Canetti R, Riva B, Rothblum GN (2012) Two protocols for delegation of computation. In: Proceedings of ICITS 2012, Springer, Berlin, pp 37–61. https://doi.org/10.1007/978-3-642-32284-6_3
Chaum D, Crépeau C, Damgard I (1988) Multiparty unconditionally secure protocols. In: Proceedings of STOC 1988, ACM, New York, NY, pp 11–19. https://doi.org/10.1145/62212.62214
Chen X (2016) Introduction to secure outsourcing computation. Synt Lect Inf Secur Privacy Trust 8(2):1–93. https://doi.org/10.2200/S00701ED1V01Y201602SPT016
Chor B, Goldreich O, Kushilevitz E, Sudan M (1995) Private information retrieval. In: Proceedings of FOCS 1995, IEEE, Milwaukee, WI, pp 41–50. https://doi.org/10.1109/SFCS.1995.492461
Chung KM, Kalai Y, Vadhan S (2010) Improved delegation of computation using fully homomorphic encryption. In: Proceedings of CRYPTO 2010, Springer, Berlin, pp 483–501. https://doi.org/10.1007/978-3-642-14623-7_26
Desmedt Y, Frankel Y (1989) Threshold cryptosystems. In: Proceedings of CRYPTO 1989, Springer , New York, Berlin, pp 307–315. https://doi.org/10.1007/0-387-34805-0_28
Dinur I, Keller N, Klein O (2018) An optimal distributed discrete log protocol with applications to homomorphic secret sharing. In: Proceedings of CRYPTO 2018, Springer, Berlin, pp 213–242. https://doi.org/10.1007/978-3-319-96878-0_8
Fazio N, Gennaro R, Jafarikhah T, Skeith WE (2017) Homomorphic secret sharing from paillier encryption. In: Proceedings of ProvSec 2017, Springer, Berlin, pp 381–399. https://doi.org/10.1007/978-3-319-68637-0_23
Fiore D, Gennaro R, Pastro V (2014) Efficiently verifiable computation on encrypted data. In: Proceedings of CCS 2014, ACM, New York, NY, pp 844–855. https://doi.org/10.1145/2660267.2660366
Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Proceedings of CRYPTO 2010, Springer, Berlin, pp 465–482. https://doi.org/10.1007/978-3-642-14623-7_25
Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of STOC 2009, ACM, New York, NY, pp 169–178. https://doi.org/10.1145/1536414.1536440
Ito M, Saito A, Nishizeki T (1987) Secret sharing schemes realizing general access structure. IEEE/IEICE global telecommunications conference 1987. Ohmsha Ltd, Tokyo, pp 99–102
Lai RWF, Malavolta G, Schröder D (2018) Homomorphic secret sharing for low degree polynomials. In: Proceedings of ASIACRYPT 2018, Springer, Berlin, pp 279–309. https://doi.org/10.1007/978-3-030-03332-3_11
Mattern F, Floerkemeier C (2010) From the internet of computers to the internet of things. In: From active data management to event-based systems and more. Springer, Berlin, pp 242–259. https://doi.org/10.1007/978-3-642-17226-7_15
Naor M, Pinkas B (2000) Distributed oblivious transfer. In: Proceedings of ASIACRYPT 2000. Springer, Berlin, pp 205–219. https://doi.org/10.1007/3-540-44448-3_16
Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Proceedings of TCC 2012. Springer, Berlin, pp 422–439. https://doi.org/10.1007/978-3-642-28914-9_24
Premkamal PK, Pasupuleti SK, Alphonse PJA (2018) A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J Ambient Intell Humaniz Comput 10(7):2693–2707. https://doi.org/10.1007/s12652-018-0967-0
Rivest RL, Adleman L, Dertouzos ML (1978) On data banks and privacy homomorphisms. Found Sec Comput 4:169–179
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT 2005, Springer, Berlin, pp 457–473. https://doi.org/10.1007/11426639_27
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613. https://doi.org/10.1145/359168.359176
Tsaloli G, Liang B, Mitrokotsa A (2018) Verifiable homomorphic secret sharing. In: 12th international conference on provable security. Springer, Berlin, pp 40–55. https://doi.org/10.1007/978-3-030-01446-9_3
Xiang C, Tang C (2015) Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. J Ambient Intell Humaniz Comput 6(1):131–139. https://doi.org/10.1007/s12652-014-0254-7
Yoshida M, Obana S (2017) Verifiably multiplicative secret sharing. In: Proceedings of ICITS 2017. Springer, Berlin, pp 73–82. https://doi.org/10.1007/978-3-319-72089-0_5
Yu J, Wang X, Gao W (2015) Improvement and applications of secure outsourcing of scientific computations. J Ambient Intell Humaniz Comput 6(6):763–772. https://doi.org/10.1007/s12652-015-0280-0
Acknowledgements
The authors would like to thank the anonymous referees for the helpful comments. This work was supported by the National Natural Science Foundation of China under Grant 61602304.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
He, Y., Zhang, L.F. Cheater-identifiable homomorphic secret sharing for outsourcing computations. J Ambient Intell Human Comput 11, 5103–5113 (2020). https://doi.org/10.1007/s12652-020-01814-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-01814-5