DocumentCode :
3585878
Title :
Bootstrap-based proxy reencryption for private multi-user computing
Author :
Troncoso-Pastoriza, Juan Ramon ; Caputo, Serena
Author_Institution :
Signal Theor. & Commun. Dept., Univ. of Vigo, Vigo, Spain
fYear :
2014
Firstpage :
107
Lastpage :
112
Abstract :
The increasingly popular paradigm of Cloud computing brings about many benefits both for clients and providers, but it also introduces privacy risks associated to outsourcing data and processes to an untrustworthy environment. In particular, the multi-user computing scenario is especially difficult to tackle from a privacy-preserving point of view, seeking to protect data from different users while allowing for flexible Cloud applications. This work leverages Gentry´s cryptographic bootstrapping operation as a means to endow fully homomorphic cryptosystem with proxy reencryption functionalities, targeted at the private multi-user and multi-key computing scenario. We provide an example implementation based on Gentry-Halevi cryptosystem, and a secure protocol that employs this primitive for solving the private multi-user computing scenario with non-colluding parties.
Keywords :
cloud computing; computer bootstrapping; cryptographic protocols; data protection; private key cryptography; Gentry-Halevi cryptosystem; bootstrap-based proxy reencryption; cloud computing; cryptographic bootstrapping operation; data outsourcing; data protection; flexible cloud applications; fully-homomorphic cryptosystem; noncolluding parties; privacy risks; privacy-preservation; private multiuser-multikey computing scenario; secure protocol; untrustworthy environment; Access control; Encryption; Protocols; Public key; Servers; Bootstrapping; Cryptographic protocols; Fully Homomorphic Encryption; Multi-key; Privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
Type :
conf
DOI :
10.1109/WIFS.2014.7084312
Filename :
7084312
Link To Document :
بازگشت