Learning Centre

Verifiable outsourced computation over encrypted data

 |  Login

Show simple item record

dc.contributor Aalto-yliopisto fi
dc.contributor Aalto University en
dc.contributor.author Yu, Xixun
dc.contributor.author Yan, Zheng
dc.contributor.author Zhang, Rui
dc.date.accessioned 2019-01-14T09:18:54Z
dc.date.available 2019-01-14T09:18:54Z
dc.date.issued 2019-04-01
dc.identifier.citation Yu , X , Yan , Z & Zhang , R 2019 , ' Verifiable outsourced computation over encrypted data ' , Information Sciences , vol. 479 , pp. 372-385 . https://doi.org/10.1016/j.ins.2018.12.022 en
dc.identifier.issn 0020-0255
dc.identifier.other PURE UUID: 1520c839-f71f-4c58-b9dd-e67fac7bb797
dc.identifier.other PURE ITEMURL: https://research.aalto.fi/en/publications/1520c839-f71f-4c58-b9dd-e67fac7bb797
dc.identifier.other PURE LINK: http://www.scopus.com/inward/record.url?scp=85058647197&partnerID=8YFLogxK
dc.identifier.other PURE FILEURL: https://research.aalto.fi/files/30824595/ELEC_Yu_et_al_Verifiable_Outsourced_Computation.pdf
dc.identifier.uri https://aaltodoc.aalto.fi/handle/123456789/35908
dc.description.abstract In recent years, cloud computing has become the most popular and promising service platform. A cloud user can outsource its heavy computation overhead to a cloud service provider (CSP) and let the CSP make the computation instead. In order to guarantee the correctness of the outsourced processing (e.g., machine learning and data mining), a proof should be provided by the CSP in order to make sure that the processing is carried out properly. On the other hand, from the security and privacy points of view, users will always encrypt their sensitive data first before they are outsourced to the CSP rather than sending the raw data directly. However, processing and verifying of encrypted data computation has always been a challenging problem. Homomorphic Encryption (HE) has been proposed to tackle this task on computations over encrypted data and ensure the confidentiality of the data. However, original HE cannot provide an efficient approach to verify the correctness of computation over encrypted data that is processed by CSP. In this paper, we propose a verifiable outsourced computation scheme over encrypted data with the help of fully homomorphic encryption and polynomial factorization algorithm. Our scheme protects user data security in outsourced processing and allows public verification on the computation result processed by CSP with zero knowledge. We then prove the security of our scheme and analyze its performance by comparing it with some latest related works. Performances analysis shows that our scheme reduces the overload of both the cloud users and the verifier. en
dc.format.extent 14
dc.format.extent 372-385
dc.format.mimetype application/pdf
dc.language.iso en en
dc.relation.ispartofseries Information Sciences en
dc.relation.ispartofseries Volume 479 en
dc.rights openAccess en
dc.title Verifiable outsourced computation over encrypted data en
dc.type A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä fi
dc.description.version Peer reviewed en
dc.contributor.department Xidian University
dc.contributor.department Department of Communications and Networking
dc.contributor.department University of Delaware
dc.subject.keyword Fully homomorphic encryption
dc.subject.keyword Outsourced computation
dc.subject.keyword Polynomial factorization algorithm
dc.subject.keyword Privacy preservation
dc.subject.keyword Verifiability
dc.identifier.urn URN:NBN:fi:aalto-201901141091
dc.identifier.doi 10.1016/j.ins.2018.12.022
dc.date.embargo info:eu-repo/date/embargoEnd/2020-12-18


Files in this item

Files Size Format View

There are no open access files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search archive


Advanced Search

article-iconSubmit a publication

Browse

Statistics