Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices

In this paper, we propose a secure protocol that allows processing encrypted data emitted by an IOT device with low computational capabilities. Its originality is threefold. It first relies on a new fast algorithm which makes possible the conversion of Combined Linear Congruential Generator (CLCG) e...

Full description

Bibliographic Details
Main Authors: Maxime Pistono, Reda Bellafqira, Gouenou Coatrieux
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9352759/
id doaj-5b4eae2e71614a03a6c87a099e57485a
record_format Article
spelling doaj-5b4eae2e71614a03a6c87a099e57485a2021-03-30T15:27:30ZengIEEEIEEE Access2169-35362021-01-019283022831610.1109/ACCESS.2021.30588499352759Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT DevicesMaxime Pistono0https://orcid.org/0000-0003-0520-2819Reda Bellafqira1https://orcid.org/0000-0002-1131-4115Gouenou Coatrieux2https://orcid.org/0000-0002-5643-0224Institut Mines-Telecom, IMT Atlantique, Inserm, UMR 1101, Brest, FranceInstitut Mines-Telecom, IMT Atlantique, Inserm, UMR 1101, Brest, FranceInstitut Mines-Telecom, IMT Atlantique, Inserm, UMR 1101, Brest, FranceIn this paper, we propose a secure protocol that allows processing encrypted data emitted by an IOT device with low computational capabilities. Its originality is threefold. It first relies on a new fast algorithm which makes possible the conversion of Combined Linear Congruential Generator (CLCG) encrypted IOT data into data homomorphically encrypted with the Damgard-Jurik (D-J) cryptosystem. In second, an original data packing strategy is given so as to reduce communication and computation complexity as well as process several D-J encrypted data at once by means of matrix operations. In third, we introduce a crypto-watermarking based integrity control mechanism. This one combines the lightweight hash function Quark with LSB substitution so as to offer the capability to check the integrity of CLCG encrypted data. We illustrate the deployment of our protocol, in the case an honest-but-curious or malicious third party wants to process encrypted data issued from a real connected knee prosthesis. We theoretically and experimentally demonstrate the performance of our solution. This one can nearly process 500 samples every second. Beyond, our proposal is suited to the general case of IOT.https://ieeexplore.ieee.org/document/9352759/Confidentialityintegritysecure data processinghomomorphic encryptioncrypto-watermarkingimplemented medical devices
collection DOAJ
language English
format Article
sources DOAJ
author Maxime Pistono
Reda Bellafqira
Gouenou Coatrieux
spellingShingle Maxime Pistono
Reda Bellafqira
Gouenou Coatrieux
Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices
IEEE Access
Confidentiality
integrity
secure data processing
homomorphic encryption
crypto-watermarking
implemented medical devices
author_facet Maxime Pistono
Reda Bellafqira
Gouenou Coatrieux
author_sort Maxime Pistono
title Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices
title_short Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices
title_full Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices
title_fullStr Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices
title_full_unstemmed Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices
title_sort cryptosystem conversion, packing and matrix processing of homomorphically encrypted data: application to iot devices
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description In this paper, we propose a secure protocol that allows processing encrypted data emitted by an IOT device with low computational capabilities. Its originality is threefold. It first relies on a new fast algorithm which makes possible the conversion of Combined Linear Congruential Generator (CLCG) encrypted IOT data into data homomorphically encrypted with the Damgard-Jurik (D-J) cryptosystem. In second, an original data packing strategy is given so as to reduce communication and computation complexity as well as process several D-J encrypted data at once by means of matrix operations. In third, we introduce a crypto-watermarking based integrity control mechanism. This one combines the lightweight hash function Quark with LSB substitution so as to offer the capability to check the integrity of CLCG encrypted data. We illustrate the deployment of our protocol, in the case an honest-but-curious or malicious third party wants to process encrypted data issued from a real connected knee prosthesis. We theoretically and experimentally demonstrate the performance of our solution. This one can nearly process 500 samples every second. Beyond, our proposal is suited to the general case of IOT.
topic Confidentiality
integrity
secure data processing
homomorphic encryption
crypto-watermarking
implemented medical devices
url https://ieeexplore.ieee.org/document/9352759/
work_keys_str_mv AT maximepistono cryptosystemconversionpackingandmatrixprocessingofhomomorphicallyencrypteddataapplicationtoiotdevices
AT redabellafqira cryptosystemconversionpackingandmatrixprocessingofhomomorphicallyencrypteddataapplicationtoiotdevices
AT gouenoucoatrieux cryptosystemconversionpackingandmatrixprocessingofhomomorphicallyencrypteddataapplicationtoiotdevices
_version_ 1724179408944627712