2020
DOI: 10.1109/tdsc.2020.3001345
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database

Abstract: We consider an outsourced computation model in the selective data sharing setting. Specifically, one of the data owners outsources the encrypted data to an untrusted cloud server, and wants to share the specific function of these data with a group of data users. A data user can perform the specific computation on the data that it is authorized to access. We propose a construction under this model for the inner product computation by using the Inner Product Functional Encryption (IPFE) as a building block. A st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…FE can provide privacy preservation on artificial intelligence (AI) applications. For example, Bahadori et al [BJMS21] On the other hand, IPFE is also used to protect outsourced computations on encrypted database against the untrusted cloud server [YSQW20]. Although IPFE is getting popular, the performance presented in previous work is still not very impressive, due to the its inherent heavy computations.…”
Section: Related Workmentioning
confidence: 99%
“…FE can provide privacy preservation on artificial intelligence (AI) applications. For example, Bahadori et al [BJMS21] On the other hand, IPFE is also used to protect outsourced computations on encrypted database against the untrusted cloud server [YSQW20]. Although IPFE is getting popular, the performance presented in previous work is still not very impressive, due to the its inherent heavy computations.…”
Section: Related Workmentioning
confidence: 99%
“…A homomorphic verifiable tag scheme is designed for blockless verification. Yang, et al, [27] developed a model for inner product computation using Inner Product Functional encryption (IPFE). There are two privacy weakness presented in the model such as master secret key and encrypted vector.…”
Section: Related Workmentioning
confidence: 99%
“…Later, Cui et al [20] constructed an efficient scheme with partially hiding access policy based on linear secret sharing scheme (LSSS) in prime-order groups. Furthermore, attribute value is hidden by wildcards [21] and inner product encryption (IPE) [22]. To some extent, hiding attribute value can protect privacy, but attribute name can still reveal user information.…”
Section: Related Workmentioning
confidence: 99%