Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing

Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the clients want to guarantee that the results are corr...

Full description

Bibliographic Details
Main Authors: Georgia Tsaloli, Gustavo Banegas, Aikaterini Mitrokotsa
Format: Article
Language:English
Published: MDPI AG 2020-09-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/4/3/25
id doaj-c61de45c96424a6f9d9c6dda722ee931
record_format Article
spelling doaj-c61de45c96424a6f9d9c6dda722ee9312020-11-25T03:23:48ZengMDPI AGCryptography2410-387X2020-09-014252510.3390/cryptography4030025Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret SharingGeorgia Tsaloli0Gustavo Banegas1Aikaterini Mitrokotsa2Department of Computer Science and Engineering, Chalmers University of Technology, 41296 Gothenburg, SwedenDepartment of Computer Science and Engineering, Chalmers University of Technology, 41296 Gothenburg, SwedenDepartment of Computer Science and Engineering, Chalmers University of Technology, 41296 Gothenburg, SwedenOften clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the clients want to guarantee that the results are correct and, thus, an output that can be publicly verified is required. However, important security and privacy challenges are raised, since clients may hold sensitive information. In this paper, we propose an approach, called verifiable additive homomorphic secret sharing (VAHSS), to achieve practical and provably secure aggregation of data, while allowing for the clients to protect their secret data and providing public verifiability i.e., everyone should be able to verify the correctness of the computed result. We propose three VAHSS constructions by combining an additive homomorphic secret sharing (HSS) scheme, for computing the sum of the clients’ secret inputs, and three different methods for achieving public verifiability, namely: (i) homomorphic collision-resistant hash functions; (ii) linear homomorphic signatures; as well as (iii) a threshold RSA signature scheme. In all three constructions, we provide a detailed correctness, security, and verifiability analysis and detailed experimental evaluations. Our results demonstrate the efficiency of our proposed constructions, especially from the client side.https://www.mdpi.com/2410-387X/4/3/25function secret sharinghomomorphic secret sharingverifiable computationpublic verifiability
collection DOAJ
language English
format Article
sources DOAJ
author Georgia Tsaloli
Gustavo Banegas
Aikaterini Mitrokotsa
spellingShingle Georgia Tsaloli
Gustavo Banegas
Aikaterini Mitrokotsa
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
Cryptography
function secret sharing
homomorphic secret sharing
verifiable computation
public verifiability
author_facet Georgia Tsaloli
Gustavo Banegas
Aikaterini Mitrokotsa
author_sort Georgia Tsaloli
title Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
title_short Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
title_full Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
title_fullStr Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
title_full_unstemmed Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
title_sort practical and provably secure distributed aggregation: verifiable additive homomorphic secret sharing
publisher MDPI AG
series Cryptography
issn 2410-387X
publishDate 2020-09-01
description Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the clients want to guarantee that the results are correct and, thus, an output that can be publicly verified is required. However, important security and privacy challenges are raised, since clients may hold sensitive information. In this paper, we propose an approach, called verifiable additive homomorphic secret sharing (VAHSS), to achieve practical and provably secure aggregation of data, while allowing for the clients to protect their secret data and providing public verifiability i.e., everyone should be able to verify the correctness of the computed result. We propose three VAHSS constructions by combining an additive homomorphic secret sharing (HSS) scheme, for computing the sum of the clients’ secret inputs, and three different methods for achieving public verifiability, namely: (i) homomorphic collision-resistant hash functions; (ii) linear homomorphic signatures; as well as (iii) a threshold RSA signature scheme. In all three constructions, we provide a detailed correctness, security, and verifiability analysis and detailed experimental evaluations. Our results demonstrate the efficiency of our proposed constructions, especially from the client side.
topic function secret sharing
homomorphic secret sharing
verifiable computation
public verifiability
url https://www.mdpi.com/2410-387X/4/3/25
work_keys_str_mv AT georgiatsaloli practicalandprovablysecuredistributedaggregationverifiableadditivehomomorphicsecretsharing
AT gustavobanegas practicalandprovablysecuredistributedaggregationverifiableadditivehomomorphicsecretsharing
AT aikaterinimitrokotsa practicalandprovablysecuredistributedaggregationverifiableadditivehomomorphicsecretsharing
_version_ 1724604474873348096