Journal of Information Security

Volume 5, Issue 1 (January 2014)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation

HTML  Download Download as PDF (Size: 492KB)  PP. 12-18  
DOI: 10.4236/jis.2014.51002    5,327 Downloads   9,664 Views  Citations

ABSTRACT

In this paper, we focus on Elliptic Curve Cryptography based approach for Secure Multiparty Computation (SMC) problem. Widespread proliferation of data and the growth of communication technologies have enabled collaborative computations among parties in distributed scenario. Preserving privacy of data owned by parties is crucial in such scenarios. Classical approach to SMC is to perform computation using Trusted Third Party (TTP). However, in practical scenario, TTPs are hard to achieve and it is imperative to eliminate TTP in SMC. In addition, existing solutions proposed for SMC use classical homomorphic encryption schemes such as RSA and Paillier. Due to the higher cost incurred by such cryptosystems, the resultant SMC protocols are not scalable. We propose Elliptic Curve Cryptography (ECC) based approach for SMC that is scalable in terms of computational and communication cost and avoids TTP. In literature, there do exist various ECC based homomorphic schemes and it is imperative to investigate and analyze these schemes in order to select the suitable for a given application. In this paper, we empirically analyze various ECC based homomorphic encryption schemes based on performance metrics such as computational cost and communication cost. We recommend an efficient algorithm amongst several selected ones, that offers security with lesser overheads and can be applied in any application demanding privacy.

Share and Cite:

S. Patel, A. Chouhan and D. Jinwala, "Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation," Journal of Information Security, Vol. 5 No. 1, 2014, pp. 12-18. doi: 10.4236/jis.2014.51002.

Cited by

[1] A hybrid RSA-DH cipher for Signed Encrypted Messages
2019
[2] Password-Based Authentication System Based on Homomorphic Encryption
2018
[3] Attribute Based Authentication System using Homomorphic Encryption
2018
[4] A review on Elliptic Curve Cryptography and Variant
2018
[5] 同态加密的分布式 K 均值聚类算法研究
计算机技术与发展, 2017
[6] Joint Computing and Privacy Designs for Cloud Data Services
ProQuest Dissertations Publishing, 2017
[7] Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
2016
[8] SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) - Special Section on Trust Management for Multimedia Big Data and Special Section on Best Papers of ACM Multimedia 2015, 2016
[9] Secure Multiparty Computation using Secret Sharing
2016
[10] ГОМОМОРФНОЕ ШИФРОВАНИЕ: БЕЗОПАСНОСТЬ ОБЛАЧНЫХ ВЫЧИСЛЕНИЙ И ДРУГИЕ ПРИЛОЖЕНИЯ (ОБЗОР)
2015
[11] Towards efficient privacy-preserving image feature extraction in cloud computing
Proceedings of the ACM International Conference on Multimedia, 2014

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.