Supporting Information for Privacy-preserving search for chemical compound databases

نویسندگان

  • Kana Shimizu
  • Koji Nuida
  • Hiromi Arai
  • Shigeo Mitsunari
  • Nuttapong Attrapadung
  • Michiaki Hamada
  • Koji Tsuda
  • Takatsugu Hirokawa
  • Jun Sakuma
  • Goichiro Hanaoka
  • Kiyoshi Asai
چکیده

For self-containment, we briefly recall the lifted ElGamal encryption scheme with the non-interactive zero-knowledge proof (NIZK) system which proves that the plaintext is either 0 or 1, proposed in [1], and provide some intuition for it. Let G be a group of prime order p such that the Decisional DiffieHellman assumption holds (i.e., the resulting encryption scheme provides a standard security property called semantic security). The public key is (g, h, f) where g, f are random generators in G and h = g for z randomly picked from Zp = {0, 1, . . . , p−1}. The secret key is z. Let H be a hash function. Encrypting a plaintext b ∈ {0, 1} gives a ciphertext (C1 = g , C2 = h f ), for random u ∈ Zp. Decryption computes y = C2C −z 1 and outputs 1 if y = f or outputs 0 if y = 1. • Encrypting a plaintext 0 outputs the ciphertext (C1, C2) where C1 = g , C2 = h u where u is randomly picked from Zp. The proof that its plaintext is either 0 or 1 consists of (s0, t0, s1, t1) where s0 = r + t0u and t0 = H(C1, C2, g , h, g11 , h11f 1)− t1 where r, s1, t1 are randomly picked from Zp. • Encrypting a plaintext 1 outputs the ciphertext (C1, C2) where C1 = g , C2 = h f where u are randomly picked from Zp. The proof that its plaintext is either 0 or 1 consists of (s0, t0, s1, t1) where s1 = r + t1u and t1 = H(C1, C2, g s0−ut0 , h00f0 , g, h)− t0 where r, s0, t0 are randomly picked from Zp.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A k-Nearest Neighbor Search Algorithm for Enhancing Data Privacy in Outsourced Spatial Databases

With the advancement of cloud computing technologies and the propagation of locationbased services, research on outsourced spatial databases has been spotlighted. Therefore, the traditional spatial databases owners want to outsource their resources to a service provider so that they can reduce cost for storage and management. However, the issue of privacy preservation is crucial in spatial data...

متن کامل

Differentially Private Local Electricity Markets

Privacy-preserving electricity markets have a key role in steering customers towards participation in local electricity markets by guarantying to protect their sensitive information. Moreover, these markets make it possible to statically release and share the market outputs for social good. This paper aims to design a market for local energy communities by implementing Differential Privacy (DP)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015