• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

R&D on privacy-preserving outsourced computing in cloud computing

Research Project

Project/Area Number 15K00028
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Theory of informatics
Research InstitutionKobe University (2018)
National Institute of Information and Communications Technology (2015-2017)

Principal Investigator

Wang Lihua  神戸大学, 工学研究科, 特命准教授 (00447228)

Co-Investigator(Kenkyū-buntansha) 林 卓也  国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 研究員 (70739995)
Research Collaborator MAMBO Masahiro  
WANG Licheng  
AONO Yoshinori  
LE Trieu Phong  
Project Period (FY) 2015-04-01 – 2019-03-31
Project Status Completed (Fiscal Year 2018)
Budget Amount *help
¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2018: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2017: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2016: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2015: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywordsクラウドセキュリティ / 代理再暗号 / 準同型暗号 / 秘密計算 / プライバシー保護データマイニング / 暗号 / 代理計算 / セキュア計算 / 代理人再暗号 / 結託攻撃 / 安全性帰着方法
Outline of Final Research Achievements

In this research, we studied the privacy-preserving outsourced computation in cloud computing and its applications in machine learning. In particular, we proposed several protocols for the inner product, matrix product, and integer comparison on ciphertexts. All the proposed protocols are secure against attacks by quantum computers, and they are also efficient according to the extensive experimental results. Based on these protocols, we also proposed several privacy-preserving outsourced machine learning schemes, including Naive Bayes classification and 3-layer neural networks. The detailed security analyses showed that these schemes would not reveal any information to the cloud or others during the process, and the experimental results also demonstrated that they are relatively efficient. With the above research results, we have published seven papers in international conferences and journals, and have applied for a patent.

Academic Significance and Societal Importance of the Research Achievements

クラウドコンピューティングに代表される、計算処理をサーバに委任する「代理計算」においては、計算対象データのサーバへの開示が必要なため、データ漏えい等の対策が必須である。本研究ではこの課題の解決策として、暗号技術を応用した安全な代理計算技術の研究開発を行っており、データを暗号化したまま計算を行うことができる「準同型暗号」において、ベクトル内積などの計算プリミティブの効率的な方式の開発や、応用例としてニューラルネットワーク推論処理などの機械学習アルゴリズムの安全な代理計算を構築した。これらの結果は、特定の処理に特化した代理計算については、データを安全に保ちつつ効率良く計算ができることを示している。

Report

(5 results)
  • 2018 Annual Research Report   Final Research Report ( PDF )
  • 2017 Research-status Report
  • 2016 Research-status Report
  • 2015 Research-status Report
  • Research Products

    (24 results)

All 2019 2018 2017 2016 Other

All Int'l Joint Research (4 results) Journal Article (8 results) (of which Int'l Joint Research: 3 results,  Peer Reviewed: 8 results,  Open Access: 8 results,  Acknowledgement Compliant: 1 results) Presentation (9 results) (of which Int'l Joint Research: 2 results) Remarks (2 results) Patent(Industrial Property Rights) (1 results)

  • [Int'l Joint Research] 北京郵電大学/Guangzhou University/East China Normal University(中国)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] Institut Mines-Telecom(フランス)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] 北京郵電大学/広州大学(中国)

    • Related Report
      2017 Research-status Report
  • [Int'l Joint Research] 北京郵電大学(中国)

    • Related Report
      2015 Research-status Report
  • [Journal Article] Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios2018

    • Author(s)
      Li Jing、Wang Licheng、Wang Lihua、Wang Xianmin、Huang Zhengan、Li Jin
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: June Issue: 22

    • DOI

      10.1002/cpe.4523

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Securing Named Data Networking: Attribute-Based Encryption and Beyond2018

    • Author(s)
      Wang Licheng、Zhang Zonghua、Dong Mianxiong、Wang Lihua、Cao Zhenfu、Yang Yixian
    • Journal Title

      IEEE Communications Magazine

      Volume: 56 Issue: 11 Pages: 76-81

    • DOI

      10.1109/mcom.2018.1701123

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption2018

    • Author(s)
      Kim Sangwook、Omori Masahiro、Hayashi Takuya、Omori Toshiaki、Wang Lihua、Ozawa Seiichi
    • Journal Title

      ICONIP 2018- 25th International Conference on Neural Information Processing

      Volume: LNCS11304 Pages: 349-358

    • DOI

      10.1007/978-3-030-04212-7_30

    • ISBN
      9783030042110, 9783030042127
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A New Secure Matrix Multiplication from Ring-LWE2018

    • Author(s)
      Wang Lihua、Aono Yoshinori、Phong Le Trieu
    • Journal Title

      CANS2017-16th International Conference on Cryptology And Network Security

      Volume: LNCS 11261 Pages: 93-111

    • DOI

      10.1007/978-3-030-02641-7_5

    • ISBN
      9783030026400, 9783030026417
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Verifiable Chebyshev Maps-Based Encryption Schemes with Outsourcing Computations in the Cloud/Fog Scenarios2018

    • Author(s)
      Jing Li, Licheng Wang, Lihua Wang, Zhengan Huang, Jin Li
    • Journal Title

      J. Concurrency and Computation: Practice and Experience

      Volume: -

    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] A new secure matrix multiplication from ring-LWE2018

    • Author(s)
      Lihua Wang, Yoshinori Aono, Le Trieu Phong
    • Journal Title

      CANS2017-16th International Conference on Cryptology And Network Security

      Volume: -

    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Generic yet Efficient Method for Secure Inner Product2017

    • Author(s)
      Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong
    • Journal Title

      Proceedings of NSS2017- 11th International Conference on Network and System Security, Springer International Publishing

      Volume: LNCS 10394 Pages: 217-232

    • DOI

      10.1007/978-3-319-64701-2_16

    • ISBN
      9783319647005, 9783319647012
    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Mis-operation Resistant Searchable Homomorphic Encryption2017

    • Author(s)
      Keita Emura, Takuya Hayashi, Noboru Kunihiro, Jun Sakuma
    • Journal Title

      Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security

      Volume: ASIA CCS'17 Pages: 215-229

    • DOI

      10.1145/3052973.3053015

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Presentation] 三層ニューラルネットワークにおけるRing-LWEベース準同型暗号を用いた効率的なプライバシー保護推論処理2019

    • Author(s)
      手塚 雄大, 王 立華, 林 卓也, Kim Sangwook, 為井 智也, 大森 敏明, 小澤 誠一
    • Organizer
      人工知能学会全国大会JSAI2019
    • Related Report
      2018 Annual Research Report
  • [Presentation] An Efficiently Secure Comparison Scheme Using Homomorphic Encryption2019

    • Author(s)
      Wang Lihua、Hayashi Takuya、Saha Tushar Kanti、Aono Yoshinori、Koshiba Takeshi、Moriai Shiho
    • Organizer
      2019年暗号と情報セキュリティシンポジウム(SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Ring-LWEを用いたセキュアな行列乗算のためのパッキング方法2018

    • Author(s)
      王 立華, プラディイプ クマル ミシュラ, 青野 良範, レ チュウ フォン, 安田 雅哉
    • Organizer
      2018年暗号と情報セキュリティシンポジウム(SCIS2018)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Ring-LWEを用いたセキュアな行列乗算のためのパッキング方法,2018

    • Author(s)
      王 立華, プラディイプ クマル ミシュラ, 青野 良範, レ チュウ フォン, 安田 雅哉
    • Organizer
      SCIS2018 暗号と情報セキュリティシンポジウム
    • Related Report
      2017 Research-status Report
  • [Presentation] 効率的な準同型内積演算の一般的構成2017

    • Author(s)
      林 卓也、青野 良範、レ チュウ フォン、王 立華
    • Organizer
      SCIS2017
    • Place of Presentation
      ロワジールホテル那覇(沖縄県那覇市西3-2-1)
    • Year and Date
      2017-01-24
    • Related Report
      2016 Research-status Report
  • [Presentation] まぜるな危険準同型暗号2016

    • Author(s)
      江村 恵太、林 卓也、國廣 昇、佐久間 淳
    • Organizer
      CSS2016
    • Place of Presentation
      秋田キャッスルホテル(秋田県秋田市中通1-3-5)
    • Year and Date
      2016-10-11
    • Related Report
      2016 Research-status Report
  • [Presentation] New Reflection on Delegatable Computation for a Secure Cloud Storage and Data Mining with Privacy-Protection2016

    • Author(s)
      Lihua Wang
    • Organizer
      A3 Foresight Program: Annual Workshop in Korea
    • Place of Presentation
      Holiday Inn Resort Alpensia Pyeongchang (325 Solbong-ro Daegwallyeong-myon, Pyeongchang-gun, Gangwon-do, Korea)
    • Year and Date
      2016-07-10
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] New Reflection on Classification & Security Reduction of Proxy Re-Encryption Applied to Cloud Environments2016

    • Author(s)
      Lihua Wang
    • Organizer
      日中韓フォーサイト事業A3 annual workshop
    • Place of Presentation
      沖縄県市町村自治会館 (沖縄県那覇市旭町116-37)
    • Year and Date
      2016-02-17
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] A Study on the Security Evaluation Methods of Proxy Re-Encryption Applied to Cloud Environments2016

    • Author(s)
      Lihua Wang, Licheng Wang, Masahiro Mambo
    • Organizer
      SCIS2016暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本県熊本市中央区東阿弥陀寺町2番地)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Remarks] DBLP (Digital Bibliography & Library Project)

    • URL

      https://dblp.uni-trier.de/pers/hd/w/Wang_0001:Lihua

    • Related Report
      2018 Annual Research Report
  • [Remarks] 情報通信研究機構 サイバーセキュリティ研究所セキュリティ基盤研究室ホームページ

    • URL

      https://www.nict.go.jp/security/research.html

    • Related Report
      2018 Annual Research Report
  • [Patent(Industrial Property Rights)] 特許権2017

    • Inventor(s)
      王 立華, 青野 良範, レ チュウ フォン
    • Industrial Property Rights Holder
      NICT
    • Industrial Property Rights Type
      特許
    • Filing Date
      2017
    • Related Report
      2017 Research-status Report

URL: 

Published: 2015-04-16   Modified: 2020-03-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi