Symmetry and Asymmetry in Cryptography and Outsourcing Computation

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: closed (31 December 2023) | Viewed by 4308

Special Issue Editor


E-Mail Website
Guest Editor
School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China
Interests: cryptography; network security; blockchain security; AI security

Special Issue Information

Dear Colleagues,

With the development of cloud computing, outsourcing computation has attracted widespread attention from the academic world and industrial community, during which the outsourcer with limited resources can delegate expensive computational work to powerful servers based on symmetry and asymmetry cryptography, capable of realizing the full utilization of a resource, possibly saving a substantial amount of computation time and cost for the outsourcer with limited ability.

Despite many tremendous advantages, outsourcing computation also encounters some security challenges, such as privacy leaks and wrong outsourcing results. Therefore, a secure outsourcing computation should simultaneously ensure the secrecy of sensitive information, verifiability of the outsourcing result and efficiency of the testing phase.

This Special Issue aims to explore and address the security and privacy aspects associated with outsourcing computation, encouraging novel, transformative and multidisciplinary solutions by addressing unique challenges in this area.

Potential topics include, but are not limited to, the following:

  • Survey of security and privacy in outsourcing computation;
  • Lightweight cryptographic primitive design for secure outsourcing computation;
  • Verifiable outsourcing computation;
  • The common theory of secure outsourcing computation;
  • Applications of secure outsourcing computation for machine learning, federated learning and distributed computation.

Prof. Dr. Yanli Ren
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • outsourcing computation
  • lightweight cryptographic primitive
  • fully verifiability
  • federated learning

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

12 pages, 1726 KiB  
Article
Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box
by Huidong Qiao, Jiangchun Ren, Zhiying Wang and Ying Hu
Symmetry 2024, 16(1), 37; https://doi.org/10.3390/sym16010037 - 28 Dec 2023
Viewed by 658
Abstract
In application scenarios such as cloud storage, a symmetric algorithm can be used to encrypt massive data. However, using the symmetric operation and keys in encryption and decryption, it is very difficult to realize an efficient access control system. The asymmetric encryption algorithm [...] Read more.
In application scenarios such as cloud storage, a symmetric algorithm can be used to encrypt massive data. However, using the symmetric operation and keys in encryption and decryption, it is very difficult to realize an efficient access control system. The asymmetric encryption algorithm ciphertext-policy attribute-based encryption (CP-ABE), as a versatile one-to-many encryption algorithm, is considered an ideal access control tool to solve the user’s distrust of the service provider of cloud storage. However, in a traditional CP-ABE system, the malicious users may deliberately leak their attribute keys to others or build a decryption black box (DB) to provide illegal decryption services for benefits, while no one can determine their identities. To deal with the problems, especially the problem of tracing the DB builder, CP-ABE schemes with black-box traceability have been proposed in the past few years. But in this paper, we point out that for now, the tracing algorithms in all existing schemes actually work on an impractical assumption. That is, whenever a DB receives a decryption request, it always performs the decryption algorithm honestlycorrectly. We argue that if a DB finds the decryption request comes from the tracing algorithm, it may intentionally output incorrect decryption results to counter the tracing. Thus, we present the structural defect of the tracing algorithm applied to all known traceable CP-ABE schemes. We describe the construction of an alert decryption black box (ADB) that is capable of distinguishing a tracing ciphertext from a normal one. We also show how an ADB frustrates the tracing algorithm, and furthermore, malicious users can even apply an ADB to frame innocent users. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Cryptography and Outsourcing Computation)
Show Figures

Figure 1

19 pages, 2058 KiB  
Article
Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain
by Mingqi Hu, Yanli Ren and Cien Chen
Symmetry 2023, 15(5), 1010; https://doi.org/10.3390/sym15051010 - 30 Apr 2023
Cited by 1 | Viewed by 1553
Abstract
Nowadays, data between hospitals are usually not interoperable, which brings great inconvenience to medical data sharing and patients’ medical treatment. In addition, patients do not want their medical data to be leaked during the sharing process. Researchers have employed blockchain to build data-sharing [...] Read more.
Nowadays, data between hospitals are usually not interoperable, which brings great inconvenience to medical data sharing and patients’ medical treatment. In addition, patients do not want their medical data to be leaked during the sharing process. Researchers have employed blockchain to build data-sharing systems to address these issues. However, current systems do not restrict the power of participants, nor do they prevent visitors from sharing the obtained data to unauthorized parties. To address these issues, we propose a private data-sharing system with symmetric encryption for the medical industry that implements power restriction and access control, and prevents the leakage of private data. To be specific, firstly, symmetric encryption algorithm is utilized to encrypt medical data to protect the privacy of data owner. Secondly, our proposed system is built on a new blockchain framework, in which only visitors with permission can access the medical data. Thirdly, we employ chameleon signature to prevent visitors from sharing data with other parties without permission. Finally, we make the power of participants in the system revocable to prevent them from abusing their power. Our proposed system has been proven to be secure through security analysis and can protect the privacy of patients. In addition, the experimental results show that our system has excellent performance in terms of time overhead compared to other systems. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Cryptography and Outsourcing Computation)
Show Figures

Figure 1

13 pages, 1056 KiB  
Article
Verifiable Keyword Search Encryption Scheme That Supports Revocation of Attributes
by Tao Feng, Sirui Miao, Chunyan Liu and Rong Ma
Symmetry 2023, 15(4), 914; https://doi.org/10.3390/sym15040914 - 14 Apr 2023
Viewed by 1155
Abstract
In recent years, searchable encryption technology and attribute encryption technology have been widely used in cloud storage environments, and attribute-based searchable encryption schemes can both achieve the retrieval of encrypted data and effectively solve the access control problem. Considering that existing attribute-based searchable [...] Read more.
In recent years, searchable encryption technology and attribute encryption technology have been widely used in cloud storage environments, and attribute-based searchable encryption schemes can both achieve the retrieval of encrypted data and effectively solve the access control problem. Considering that existing attribute-based searchable encryption schemes for cloud storage only support keyword search and do not support attribute revocation, most of the schemes that support attribute revocation only consider the computational overhead of users and ignore the large amount of computational resources consumed by attribute authorization centers when updating keys. In addition, keyword search may lead to partial errors in the returned search results, leading to the wastage of computational and broadband resources. To solve these issues, this paper proposes an attribute-based searchable encryption scheme that supports attribute revocation and is verifiable. To realize fine-grained ciphertext search of encrypted data, support scenarios of dynamic changes of user attributes, and ensure that third-party servers perform the search process reliably and honestly while minimizing computation and storage costs, first, this paper implements attribute revocation with the attribute authorization center by creating a user revocation list and an attribute key revocation list. At the same time, the system updates the attribute key at the time of user search request, which effectively reduces the computational overhead. Second, a third-party auditor is introduced to ensure the correctness of the search results. Finally, the security of this paper is verified by theoretical analysis, and the efficiency and practicality of this paper are verified by comparing it to other schemes through simulation experiments. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Cryptography and Outsourcing Computation)
Show Figures

Figure 1

Back to TopTop