Distributed Proxy Re- Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption

Busranur Bulbul Demir, Deniz Turgay Altilar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Secure computation is required to protect data security and privacy. Homomorphic encryption is known as a safe way for secure computation. However, it comes with limitations such that the ciphertexts to be evaluated must be encrypted with the same key. In the multiparty system, homomorphic evaluation becomes more complex apart from the existing complexity of the homomorphic encryption because of the limitation. In this article, the multi party homomorphic evaluations that are available in the literature are investigated and a novel design is proposed. Distributed proxy re-encryption algorithm that is available for untrusted or semi-trusted system is presented besides distibuted decryption protocol. The pro-posed design is implemented with k-nearest neighbors (KNN) classification algorithm and the results are evaluated in terms of security, privacy and efficiency. The suggested protocol increases operational efficiency while the data security and privacy are provided.

Original languageEnglish
Title of host publication2024 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages199-204
Number of pages6
ISBN (Electronic)9798350351859
DOIs
Publication statusPublished - 2024
Event12th IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2024 - Tbilisi, Georgia
Duration: 24 Jun 202427 Jun 2024

Publication series

Name2024 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2024

Conference

Conference12th IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2024
Country/TerritoryGeorgia
CityTbilisi
Period24/06/2427/06/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Keywords

  • homomorphic encryption
  • proxy re-encryption
  • secure data mining
  • secure multiparty compu-tation

Fingerprint

Dive into the research topics of 'Distributed Proxy Re- Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption'. Together they form a unique fingerprint.

Cite this