Homomorphic encryption allows computation over encrypted data, and can be used for delegating computation: data providers encrypt their data and send them to an aggregator, who can then perform computation over the encrypted data on behalf of a client, without the underlying data being exposed to the aggregator. However, since the aggregator is merely a third party, it may be malicious, and in particular, may submit an incorrect aggregation result to the receiver. Ohara et al. (APKC2014) studied secure aggregation of time-series data while enabling the correctness of aggregation to be verified. However, they only provided a concrete construction in the smart metering system and only gave an intuitive argument of security. In this paper, we define verifiable homomorphic encryption (VHE) which generalizes their scheme, and introduce formal security definitions. Further, we formally prove that Ohara et al.'s VHE scheme satisfies our proposed security definitions.
Satoshi YASUDA
Mitsubishi Electric
Yoshihiro KOSEKI
Mitsubishi Electric
Yusuke SAKAI
National Institute of Advanced Industrial Science and Technology (AIST)
Fuyuki KITAGAWA
National Institute of Advanced Industrial Science and Technology (AIST),Tokyo Institute of Technology
Yutaka KAWAI
Mitsubishi Electric
Goichiro HANAOKA
National Institute of Advanced Industrial Science and Technology (AIST)
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Satoshi YASUDA, Yoshihiro KOSEKI, Yusuke SAKAI, Fuyuki KITAGAWA, Yutaka KAWAI, Goichiro HANAOKA, "Verifiable Privacy-Preserving Data Aggregation Protocols" in IEICE TRANSACTIONS on Fundamentals,
vol. E103-A, no. 1, pp. 183-194, January 2020, doi: 10.1587/transfun.2019CIP0024.
Abstract: Homomorphic encryption allows computation over encrypted data, and can be used for delegating computation: data providers encrypt their data and send them to an aggregator, who can then perform computation over the encrypted data on behalf of a client, without the underlying data being exposed to the aggregator. However, since the aggregator is merely a third party, it may be malicious, and in particular, may submit an incorrect aggregation result to the receiver. Ohara et al. (APKC2014) studied secure aggregation of time-series data while enabling the correctness of aggregation to be verified. However, they only provided a concrete construction in the smart metering system and only gave an intuitive argument of security. In this paper, we define verifiable homomorphic encryption (VHE) which generalizes their scheme, and introduce formal security definitions. Further, we formally prove that Ohara et al.'s VHE scheme satisfies our proposed security definitions.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2019CIP0024/_p
Copy
@ARTICLE{e103-a_1_183,
author={Satoshi YASUDA, Yoshihiro KOSEKI, Yusuke SAKAI, Fuyuki KITAGAWA, Yutaka KAWAI, Goichiro HANAOKA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Verifiable Privacy-Preserving Data Aggregation Protocols},
year={2020},
volume={E103-A},
number={1},
pages={183-194},
abstract={Homomorphic encryption allows computation over encrypted data, and can be used for delegating computation: data providers encrypt their data and send them to an aggregator, who can then perform computation over the encrypted data on behalf of a client, without the underlying data being exposed to the aggregator. However, since the aggregator is merely a third party, it may be malicious, and in particular, may submit an incorrect aggregation result to the receiver. Ohara et al. (APKC2014) studied secure aggregation of time-series data while enabling the correctness of aggregation to be verified. However, they only provided a concrete construction in the smart metering system and only gave an intuitive argument of security. In this paper, we define verifiable homomorphic encryption (VHE) which generalizes their scheme, and introduce formal security definitions. Further, we formally prove that Ohara et al.'s VHE scheme satisfies our proposed security definitions.},
keywords={},
doi={10.1587/transfun.2019CIP0024},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Verifiable Privacy-Preserving Data Aggregation Protocols
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 183
EP - 194
AU - Satoshi YASUDA
AU - Yoshihiro KOSEKI
AU - Yusuke SAKAI
AU - Fuyuki KITAGAWA
AU - Yutaka KAWAI
AU - Goichiro HANAOKA
PY - 2020
DO - 10.1587/transfun.2019CIP0024
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E103-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2020
AB - Homomorphic encryption allows computation over encrypted data, and can be used for delegating computation: data providers encrypt their data and send them to an aggregator, who can then perform computation over the encrypted data on behalf of a client, without the underlying data being exposed to the aggregator. However, since the aggregator is merely a third party, it may be malicious, and in particular, may submit an incorrect aggregation result to the receiver. Ohara et al. (APKC2014) studied secure aggregation of time-series data while enabling the correctness of aggregation to be verified. However, they only provided a concrete construction in the smart metering system and only gave an intuitive argument of security. In this paper, we define verifiable homomorphic encryption (VHE) which generalizes their scheme, and introduce formal security definitions. Further, we formally prove that Ohara et al.'s VHE scheme satisfies our proposed security definitions.
ER -