Supporting Information for Privacy-preserving search for chemical compound databases
نویسندگان
چکیده
For self-containment, we briefly recall the lifted ElGamal encryption scheme with the non-interactive zero-knowledge proof (NIZK) system which proves that the plaintext is either 0 or 1, proposed in [1], and provide some intuition for it. Let G be a group of prime order p such that the Decisional DiffieHellman assumption holds (i.e., the resulting encryption scheme provides a standard security property called semantic security). The public key is (g, h, f) where g, f are random generators in G and h = g for z randomly picked from Zp = {0, 1, . . . , p−1}. The secret key is z. Let H be a hash function. Encrypting a plaintext b ∈ {0, 1} gives a ciphertext (C1 = g , C2 = h f ), for random u ∈ Zp. Decryption computes y = C2C −z 1 and outputs 1 if y = f or outputs 0 if y = 1. • Encrypting a plaintext 0 outputs the ciphertext (C1, C2) where C1 = g , C2 = h u where u is randomly picked from Zp. The proof that its plaintext is either 0 or 1 consists of (s0, t0, s1, t1) where s0 = r + t0u and t0 = H(C1, C2, g , h, g11 , h11f 1)− t1 where r, s1, t1 are randomly picked from Zp. • Encrypting a plaintext 1 outputs the ciphertext (C1, C2) where C1 = g , C2 = h f where u are randomly picked from Zp. The proof that its plaintext is either 0 or 1 consists of (s0, t0, s1, t1) where s1 = r + t1u and t1 = H(C1, C2, g s0−ut0 , h00f0 , g, h)− t0 where r, s0, t0 are randomly picked from Zp.
منابع مشابه
A centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملA k-Nearest Neighbor Search Algorithm for Enhancing Data Privacy in Outsourced Spatial Databases
With the advancement of cloud computing technologies and the propagation of locationbased services, research on outsourced spatial databases has been spotlighted. Therefore, the traditional spatial databases owners want to outsource their resources to a service provider so that they can reduce cost for storage and management. However, the issue of privacy preservation is crucial in spatial data...
متن کاملDifferentially Private Local Electricity Markets
Privacy-preserving electricity markets have a key role in steering customers towards participation in local electricity markets by guarantying to protect their sensitive information. Moreover, these markets make it possible to statically release and share the market outputs for social good. This paper aims to design a market for local energy communities by implementing Differential Privacy (DP)...
متن کامل