{"title":"延展性弹性(高级)隐藏数据聚合","authors":"D. Westhoff, Osman Ugus","doi":"10.1109/WoWMoM.2013.6583470","DOIUrl":null,"url":null,"abstract":"It is the objective of this work to propose an extension of the Concealed Data Aggregation (CDA) approach which has originally been invented to allow some forms of in-network processing on encrypted data for reverse multicast traffic a.k.a. convergecast traffic. Extensions have been done with respect to two axes: Our proposed Malleability Resilient Concealed Data Aggregation (MR-CDA) combines recently presented homomorphic MACs with additively homomorphic encryption schemes and thus helps detecting outsider attacks which maliciously add resp. inject encrypted data to an aggregated encrypted data format. In the visionary part of this work with the malleability resilient premium concealed data aggregation (MR-P-CDA) we investigate what cryptographic primitives are in principle available to provide the most flexible form of encrypted in-network processing. Whereas the MR-CDA is in particular optimized with respect to its computational performance, the MR-P-CDA intentionally is not taking into account performance issues. Instead its focus is on the provisioning of an overall system security without any functional restrictions.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Malleability resilient (premium) Concealed Data Aggregation\",\"authors\":\"D. Westhoff, Osman Ugus\",\"doi\":\"10.1109/WoWMoM.2013.6583470\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is the objective of this work to propose an extension of the Concealed Data Aggregation (CDA) approach which has originally been invented to allow some forms of in-network processing on encrypted data for reverse multicast traffic a.k.a. convergecast traffic. Extensions have been done with respect to two axes: Our proposed Malleability Resilient Concealed Data Aggregation (MR-CDA) combines recently presented homomorphic MACs with additively homomorphic encryption schemes and thus helps detecting outsider attacks which maliciously add resp. inject encrypted data to an aggregated encrypted data format. In the visionary part of this work with the malleability resilient premium concealed data aggregation (MR-P-CDA) we investigate what cryptographic primitives are in principle available to provide the most flexible form of encrypted in-network processing. Whereas the MR-CDA is in particular optimized with respect to its computational performance, the MR-P-CDA intentionally is not taking into account performance issues. Instead its focus is on the provisioning of an overall system security without any functional restrictions.\",\"PeriodicalId\":158378,\"journal\":{\"name\":\"2013 IEEE 14th International Symposium on \\\"A World of Wireless, Mobile and Multimedia Networks\\\" (WoWMoM)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE 14th International Symposium on \\\"A World of Wireless, Mobile and Multimedia Networks\\\" (WoWMoM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WoWMoM.2013.6583470\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WoWMoM.2013.6583470","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malleability resilient (premium) Concealed Data Aggregation
It is the objective of this work to propose an extension of the Concealed Data Aggregation (CDA) approach which has originally been invented to allow some forms of in-network processing on encrypted data for reverse multicast traffic a.k.a. convergecast traffic. Extensions have been done with respect to two axes: Our proposed Malleability Resilient Concealed Data Aggregation (MR-CDA) combines recently presented homomorphic MACs with additively homomorphic encryption schemes and thus helps detecting outsider attacks which maliciously add resp. inject encrypted data to an aggregated encrypted data format. In the visionary part of this work with the malleability resilient premium concealed data aggregation (MR-P-CDA) we investigate what cryptographic primitives are in principle available to provide the most flexible form of encrypted in-network processing. Whereas the MR-CDA is in particular optimized with respect to its computational performance, the MR-P-CDA intentionally is not taking into account performance issues. Instead its focus is on the provisioning of an overall system security without any functional restrictions.