9,585 research outputs found
A Framework for Outsourcing of Secure Computation
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is honest.
In our setting there are a number of clients with inputs . The clients want to delegate a secure computation of to a set of untrusted workers . We want do so in such a way that as long as there is at least one honest worker (and everyone else might be actively corrupted) the following holds:
* the privacy of the inputs is preserved;
* output of the computation is correct (in particular workers cannot change the inputs of honest clients).
We propose a solution where the clients\u27 work is minimal and the interaction pattern simple (one message to upload inputs, one to receive results), while at the same time reducing the overhead for the workers to a minimum. Our solution is generic and can be instantiated with any underlying reactive MPC protocol where linear operations are ``for free\u27\u27. In contrast previous solutions were less generic and could only be instantiated for specific numbers of clients/workers
Optimal Controller and Security Parameter for Encrypted Control Systems Under Least Squares Identification
Encrypted control is a framework for the secure outsourcing of controller
computation using homomorphic encryption that allows to perform arithmetic
operations on encrypted data without decryption. In a previous study, the
security level of encrypted control systems was quantified based on the
difficulty and computation time of system identification. This study
investigates an optimal design of encrypted control systems when facing an
attack attempting to estimate a system parameter by the least squares method
from the perspective of the security level. This study proposes an optimal
controller that maximizes the difficulty of estimation and an equation to
determine the minimum security parameter that guarantee the security of an
encrypted control system as a solution to the design problem. The proposed
controller and security parameter are beneficial for reducing the computation
costs of an encrypted control system, while achieving the desired security
level. Furthermore, the proposed design method enables the systematic design of
encrypted control systems.Comment: 6 pages, 1 figur
DeepSecure: Scalable Provably-Secure Deep Learning
This paper proposes DeepSecure, a novel framework that enables scalable
execution of the state-of-the-art Deep Learning (DL) models in a
privacy-preserving setting. DeepSecure targets scenarios in which neither of
the involved parties including the cloud servers that hold the DL model
parameters or the delegating clients who own the data is willing to reveal
their information. Our framework is the first to empower accurate and scalable
DL analysis of data generated by distributed clients without sacrificing the
security to maintain efficiency. The secure DL computation in DeepSecure is
performed using Yao's Garbled Circuit (GC) protocol. We devise GC-optimized
realization of various components used in DL. Our optimized implementation
achieves more than 58-fold higher throughput per sample compared with the
best-known prior solution. In addition to our optimized GC realization, we
introduce a set of novel low-overhead pre-processing techniques which further
reduce the GC overall runtime in the context of deep learning. Extensive
evaluations of various DL applications demonstrate up to two
orders-of-magnitude additional runtime improvement achieved as a result of our
pre-processing methodology. This paper also provides mechanisms to securely
delegate GC computations to a third party in constrained embedded settings
Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data
Multi-user multi-keyword ranked search scheme in arbitrary language is a
novel multi-keyword rank searchable encryption (MRSE) framework based on
Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous
MRSE schemes constructed based on the k-nearest neighbor searcha-ble encryption
(KNN-SE) algorithm, it can mitigate some draw-backs and achieve better
performance in terms of functionality and efficiency. Additionally, it does not
require a predefined keyword set and support keywords in arbitrary languages.
However, due to the pattern of exact matching of keywords in the new MRSE
scheme, multilingual search is limited to each language and cannot be searched
across languages. In this pa-per, we propose a cross-lingual multi-keyword rank
search (CLRSE) scheme which eliminates the barrier of languages and achieves
semantic extension with using the Open Multilingual Wordnet. Our CLRSE scheme
also realizes intelligent and per-sonalized search through flexible keyword and
language prefer-ence settings. We evaluate the performance of our scheme in
terms of security, functionality, precision and efficiency, via extensive
experiments
- β¦