Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices
In this paper, we propose a secure protocol that allows processing encrypted data emitted by an IOT device with low computational capabilities. Its originality is threefold. It first relies on a new fast algorithm which makes possible the conversion of Combined Linear Congruential Generator (CLCG) e...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9352759/ |
id |
doaj-5b4eae2e71614a03a6c87a099e57485a |
---|---|
record_format |
Article |
spelling |
doaj-5b4eae2e71614a03a6c87a099e57485a2021-03-30T15:27:30ZengIEEEIEEE Access2169-35362021-01-019283022831610.1109/ACCESS.2021.30588499352759Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT DevicesMaxime Pistono0https://orcid.org/0000-0003-0520-2819Reda Bellafqira1https://orcid.org/0000-0002-1131-4115Gouenou Coatrieux2https://orcid.org/0000-0002-5643-0224Institut Mines-Telecom, IMT Atlantique, Inserm, UMR 1101, Brest, FranceInstitut Mines-Telecom, IMT Atlantique, Inserm, UMR 1101, Brest, FranceInstitut Mines-Telecom, IMT Atlantique, Inserm, UMR 1101, Brest, FranceIn this paper, we propose a secure protocol that allows processing encrypted data emitted by an IOT device with low computational capabilities. Its originality is threefold. It first relies on a new fast algorithm which makes possible the conversion of Combined Linear Congruential Generator (CLCG) encrypted IOT data into data homomorphically encrypted with the Damgard-Jurik (D-J) cryptosystem. In second, an original data packing strategy is given so as to reduce communication and computation complexity as well as process several D-J encrypted data at once by means of matrix operations. In third, we introduce a crypto-watermarking based integrity control mechanism. This one combines the lightweight hash function Quark with LSB substitution so as to offer the capability to check the integrity of CLCG encrypted data. We illustrate the deployment of our protocol, in the case an honest-but-curious or malicious third party wants to process encrypted data issued from a real connected knee prosthesis. We theoretically and experimentally demonstrate the performance of our solution. This one can nearly process 500 samples every second. Beyond, our proposal is suited to the general case of IOT.https://ieeexplore.ieee.org/document/9352759/Confidentialityintegritysecure data processinghomomorphic encryptioncrypto-watermarkingimplemented medical devices |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Maxime Pistono Reda Bellafqira Gouenou Coatrieux |
spellingShingle |
Maxime Pistono Reda Bellafqira Gouenou Coatrieux Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices IEEE Access Confidentiality integrity secure data processing homomorphic encryption crypto-watermarking implemented medical devices |
author_facet |
Maxime Pistono Reda Bellafqira Gouenou Coatrieux |
author_sort |
Maxime Pistono |
title |
Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices |
title_short |
Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices |
title_full |
Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices |
title_fullStr |
Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices |
title_full_unstemmed |
Cryptosystem Conversion, Packing and Matrix Processing of Homomorphically Encrypted Data: Application to IOT Devices |
title_sort |
cryptosystem conversion, packing and matrix processing of homomorphically encrypted data: application to iot devices |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2021-01-01 |
description |
In this paper, we propose a secure protocol that allows processing encrypted data emitted by an IOT device with low computational capabilities. Its originality is threefold. It first relies on a new fast algorithm which makes possible the conversion of Combined Linear Congruential Generator (CLCG) encrypted IOT data into data homomorphically encrypted with the Damgard-Jurik (D-J) cryptosystem. In second, an original data packing strategy is given so as to reduce communication and computation complexity as well as process several D-J encrypted data at once by means of matrix operations. In third, we introduce a crypto-watermarking based integrity control mechanism. This one combines the lightweight hash function Quark with LSB substitution so as to offer the capability to check the integrity of CLCG encrypted data. We illustrate the deployment of our protocol, in the case an honest-but-curious or malicious third party wants to process encrypted data issued from a real connected knee prosthesis. We theoretically and experimentally demonstrate the performance of our solution. This one can nearly process 500 samples every second. Beyond, our proposal is suited to the general case of IOT. |
topic |
Confidentiality integrity secure data processing homomorphic encryption crypto-watermarking implemented medical devices |
url |
https://ieeexplore.ieee.org/document/9352759/ |
work_keys_str_mv |
AT maximepistono cryptosystemconversionpackingandmatrixprocessingofhomomorphicallyencrypteddataapplicationtoiotdevices AT redabellafqira cryptosystemconversionpackingandmatrixprocessingofhomomorphicallyencrypteddataapplicationtoiotdevices AT gouenoucoatrieux cryptosystemconversionpackingandmatrixprocessingofhomomorphicallyencrypteddataapplicationtoiotdevices |
_version_ |
1724179408944627712 |