Distributed Proxy Re- Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption
Secure computation is required to protect data security and privacy. Homomorphic encryption is known as a safe way for secure computation. However, it comes with limitations such that the ciphertexts to be evaluated must be encrypted with the same key. In the multiparty system, homomorphic evaluatio...
Gespeichert in:
| Veröffentlicht in: | International Black Sea Conference on Communications and Networking S. 199 - 204 |
|---|---|
| Hauptverfasser: | , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
24.06.2024
|
| Schlagworte: | |
| ISSN: | 2687-9808 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Secure computation is required to protect data security and privacy. Homomorphic encryption is known as a safe way for secure computation. However, it comes with limitations such that the ciphertexts to be evaluated must be encrypted with the same key. In the multiparty system, homomorphic evaluation becomes more complex apart from the existing complexity of the homomorphic encryption because of the limitation. In this article, the multi party homomorphic evaluations that are available in the literature are investigated and a novel design is proposed. Distributed proxy re-encryption algorithm that is available for untrusted or semi-trusted system is presented besides distibuted decryption protocol. The pro-posed design is implemented with k-nearest neighbors (KNN) classification algorithm and the results are evaluated in terms of security, privacy and efficiency. The suggested protocol increases operational efficiency while the data security and privacy are provided. |
|---|---|
| AbstractList | Secure computation is required to protect data security and privacy. Homomorphic encryption is known as a safe way for secure computation. However, it comes with limitations such that the ciphertexts to be evaluated must be encrypted with the same key. In the multiparty system, homomorphic evaluation becomes more complex apart from the existing complexity of the homomorphic encryption because of the limitation. In this article, the multi party homomorphic evaluations that are available in the literature are investigated and a novel design is proposed. Distributed proxy re-encryption algorithm that is available for untrusted or semi-trusted system is presented besides distibuted decryption protocol. The pro-posed design is implemented with k-nearest neighbors (KNN) classification algorithm and the results are evaluated in terms of security, privacy and efficiency. The suggested protocol increases operational efficiency while the data security and privacy are provided. |
| Author | Altilar, Deniz Turgay Demir, Busranur Bulbul |
| Author_xml | – sequence: 1 givenname: Busranur Bulbul surname: Demir fullname: Demir, Busranur Bulbul email: altilar@itu.edu.tr organization: Computer Engineering Istanbul Technical University,Istanbul,Turkey – sequence: 2 givenname: Deniz Turgay surname: Altilar fullname: Altilar, Deniz Turgay email: bulbulb17@itu.edu.tr organization: Computer Engineering Istanbul Technical University,Istanbul,Turkey |
| BookMark | eNpNUMtOwzAQNAgkSukfcPCJW4rfdo5QWopUBKK9V46zVQ1JHTmOIH9PeEloDruzGo1m5xydHMIBELqiZEopya9vK-ve1mBnoVZUCzVlhIkpJUooxtgRmuQ6N1wSLqmR-TEaMWV0lhtiztCkbV8JIZxqLTUfofrOtyn6oktQ4ucYPnr8AhmeH1zsm-TD4euYggsV3oWI1-C6CPixq5JvbEw9HkI0XbLf0nef9njRVVWPl6EeEJu9d__MLtDpzlYtTH7nGG0W881sma2e7h9mN6vMU61SxsCVUJRApRO0FI4WzBjKh1WC3Rnj1ECMYVxQnQ9vl1JZlRfCciG4BD5Glz-2HgC2TfS1jf32ryD-CYwsYRg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/BlackSeaCom61746.2024.10646222 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9798350351859 |
| EISSN | 2687-9808 |
| EndPage | 204 |
| ExternalDocumentID | 10646222 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL |
| ID | FETCH-LOGICAL-i176t-2ecdebde15c41d4c1b288131d45eaf88c613188234179064d56a69b4a34435e3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001310519400035&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:01:28 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i176t-2ecdebde15c41d4c1b288131d45eaf88c613188234179064d56a69b4a34435e3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_10646222 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-June-24 |
| PublicationDateYYYYMMDD | 2024-06-24 |
| PublicationDate_xml | – month: 06 year: 2024 text: 2024-June-24 day: 24 |
| PublicationDecade | 2020 |
| PublicationTitle | International Black Sea Conference on Communications and Networking |
| PublicationTitleAbbrev | BLACKSEACOM |
| PublicationYear | 2024 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0003177573 |
| Score | 1.874125 |
| Snippet | Secure computation is required to protect data security and privacy. Homomorphic encryption is known as a safe way for secure computation. However, it comes... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 199 |
| SubjectTerms | Computational modeling Data privacy Heuristic algorithms homomorphic encryption Multi-party computation Nearest neighbor methods Privacy Protocols proxy re-encryption secure data mining secure multiparty compu-tation |
| Title | Distributed Proxy Re- Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption |
| URI | https://ieeexplore.ieee.org/document/10646222 |
| WOSCitedRecordID | wos001310519400035&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZohRAsvIp4ywNiS5Fjx05maNUBVRV06FY59lXq0KQqKSL_njv3QRkYUBbLiqzEl8s9fN99jD1kkGjlJ1QqZRMMUCCLMo_qrrSTyhhrchuAwq-m309Ho2ywBqsHLAwAhOIzaNMwnOX70i0pVYYarpVGg9ZgDWP0Cqy1TaigITSJkQfscd1H8ymkwN7BomahnVZUkBCr9maRX3QqwZp0j__5HCes9YPL44OtxTlle1CcsaOdloLnbPZCnXCJxAo83ftV8zeIeKdwizr8HWiyKlH8HN1VHtLtwAMMd45fUc1XNA9BXpyStJyC1Jr3yhleKJSp21msxYbdzvC5F60pFaKpMLqKYnAecg8icUp45UQep6mQOEzATtLUoXUX6HRLIibDt_SJtjrLlZUK_SqQF6xZlAVcMq4cHRBOpBG5VHFu0gwo1CMOGy8ykFesRRs3nq-aZow3e3b9x_wNOyTxUBVWrG5Zs1os4Y7tu89q-rG4D6L-BiqJqyY |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgIB4XXkO8yQFx61CbtGnPsGmIMU2ww25Tm3jSDuum0SH677GzB-PAAfUSRVHUxnHtOP78AdwlGEbKDjhVKg3pgIKJl1hSdxUZqbROdZY6oHBLt9txr5d0FmB1h4VBRJd8hjVuurt8OzYzDpWRhkcqIoO2CVtMnRXO4VqrkAqZQh1quQP3i0qaDy4I9o4p6RZZasUpCYGqLaf5Raji7Enj4J9vcgjVH2Se6KxszhFsYH4M-2tFBU9g9MS1cJnGCi2P_SrFG3qinptp6f4P3FmMaQMIcliFC7ijcEDcCe2jUsyJHpzEBIdpBR9TS9Ecj-ghsQzN2mRV6Dbq3cemtyBV8Ia-jgovQGMxs-iHRvlWGT8L4tiX1AwxHcSxIfvuk9stmZqMvtKGURolmUqlIs8K5SlU8nGOZyCU4SvCgdR-JlWQ6ThBPuwxi431E5TnUOWF60_mZTP6yzW7-KP_Fnab3ddWv_XcfrmEPRYV52QF6goqxXSG17BtPovhx_TGif0bRQqucQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Black+Sea+Conference+on+Communications+and+Networking&rft.atitle=Distributed+Proxy+Re-+Encryption+Protocol+for+Secure+Multiparty+Computation+with+Fully+Homomorphic+Encryption&rft.au=Demir%2C+Busranur+Bulbul&rft.au=Altilar%2C+Deniz+Turgay&rft.date=2024-06-24&rft.pub=IEEE&rft.eissn=2687-9808&rft.spage=199&rft.epage=204&rft_id=info:doi/10.1109%2FBlackSeaCom61746.2024.10646222&rft.externalDocID=10646222 |