Skip to main content

Indistinguishable Obfuscated Encryption and Decryption Based on Transformer Model

  • Conference paper
  • First Online:
Book cover Smart Computing and Communication (SmartCom 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13828))

Included in the following conference series:

Abstract

To solve the problem in secure encryption in cryptography, indistinguishability Obfuscation (iO) was born. It is a crypto-complete idea, based on which we can build many cryptographic construction. The implementation of it can hide both the dataset and the program itself. In this paper, we use the idea of translation in the (Natural Language Processing) NLP-like language model to realize the conversion between plaintexts and ciphertexts with the help of hints. We trained a self-attention transformer model, successfully hiding the dataset as well as the encryption and decryption programs. The input of the encryption model is a plaintext prefixed with a hint and the output is the result of encryption using one of the specified algorithms. The input and output of the decryption model are the opposite of the encryption one.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)

    Google Scholar 

  2. Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. In: ACM TMCCA (2016)

    Google Scholar 

  3. Qiu, M., Chen, Z., et al.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813–822 (2014)

    Article  Google Scholar 

  4. Qiu, M., et al.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE, pp. 1–6 (2007)

    Google Scholar 

  5. Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. In: JSPS (2007)

    Google Scholar 

  6. Qiu, M., et al.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE TVLSI 18(3), 501–504 (2009)

    Google Scholar 

  7. Qiu, M., Xue, C, et al.: Efficient algorithm of energy minimization for heterogeneous wireless sensor network. In: IEEE EUC, pp. 25–34 (2006)

    Google Scholar 

  8. Niu, J., Gao, Y., et al.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC 72(12), 1565–1575 (2012)

    Google Scholar 

  9. Qiu, H., Zheng, Q., et al.: Deep residual learning-based enhanced JPEG compression in the internet of things. IEEE Trans. Ind. Inf. 17(3), 2124–2133 (2020)

    Google Scholar 

  10. Qiu, M., Qiu, H., et al.: Secure data sharing through untrusted clouds with blockchain-enabled key management. In: 3rd SmartBlock Conference, pp. 11–16 (2020)

    Google Scholar 

  11. Gai, K., Zhang, Y., et al.: Blockchain-enabled service optimizations in supply chain digital twin. In: IEEE TSC (2022)

    Google Scholar 

  12. Qiu, M., Qiu, H.: Review on image processing based adversarial example defenses in computer vision. In: IEEE 6th International Conference BigDataSecurity, pp. 94–99 (2020)

    Google Scholar 

  13. Hu, F., Lakdawala, S., et al.: Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE TITB 13(4), 656–663 (2009)

    Google Scholar 

  14. Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Arch. 57(9), 840–849 (2011)

    Article  Google Scholar 

  15. Qiu, H., Zheng, Q., et al.: Topological graph convolutional network-based urban traffic flow and density prediction. IEEE Trans. ITS 22(7), 4560–4569 (2020)

    Google Scholar 

  16. Denning, D.E.R.: Cryptography and Data Security, vol. 112. Addison-Wesley Reading, Boston (1982)

    Google Scholar 

  17. Qiu, H., Qiu, M., Lu, R.: Secure V2X communication network based on intelligent PKI and edge computing. IEEE Network 34(2), 172–178 (2019)

    Article  Google Scholar 

  18. Qiu, H., Zeng, Y., et al.: Deepsweep: an evaluation framework for mitigating DNN backdoor attacks using data augmentation. In: ACM AsiaCCS (2021)

    Google Scholar 

  19. K. Gai et al. A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In IEEE BigDataSecurity (2016)

    Google Scholar 

  20. Jain, A., Lin, H., Sahai, A.: Indistinguishability obfuscation from well-founded assumptions. In: Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, pp. 60–73 (2021)

    Google Scholar 

  21. Liu, Y., Liu, J., Zhang, Z., Yu, H.: A fair selection protocol for committee-based permissionless blockchains. Comput. Secur. 91, 101718 (2020)

    Article  Google Scholar 

  22. Liu, Y., Liu, J., Qianhong, W., Hui, Yu., Hei, Y., Zhou, Z.: SSHC: a secure and scalable hybrid consensus protocol for sharding blockchains with a formal security framework. IEEE Trans. Dependable Secur. Comput. 19(3), 2070–2088 (2022)

    Article  Google Scholar 

  23. Liu, Y., Liu, J., Yin, J., Li, G., Yu, H., Wu, Q.: Cross-shard transaction processing in sharding blockchains. In: Qiu, M. (ed.) ICA3PP 2020. LNCS, vol. 12454, pp. 324–339. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60248-2_22

    Chapter  Google Scholar 

  24. Liu, Y., Liu, J., Hei, Y., Tan, W., Wu, Q.: A secure shard reconfiguration protocol for sharding blockchains without a randomness. In: TrustCom 2020, pp. 1012–1019. IEEE (2020)

    Google Scholar 

  25. Liu, Y., Xia, Y., Liu, J., Hei, Y.: A secure and decentralized reconfiguration protocol for sharding blockchains. In: IEEE HPSC 2021, pp. 111–116. IEEE (2021)

    Google Scholar 

  26. Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643–673. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56614-6_22

    Chapter  MATH  Google Scholar 

  27. Liu, Y., Liu, J., Zhang, Z., Tongge, X., Hui, Yu.: Overview on consensus mechanism of blockchain technology. J. Cryptologic Res. 6(4), 395–432 (2019)

    Google Scholar 

  28. Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. IEEE SP 2018, 583–598 (2018)

    Google Scholar 

  29. Bin, H., Zhang, Z., Liu, J., Liu, Y., Yin, J., Rongxing, L., Lin, X.: A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems. Patterns 2(2), 100179 (2021)

    Article  Google Scholar 

  30. Liu, Y., Qiu, M., Liu, J., Liu, M.: Blockchain-based access control approaches. In: IEEE CSCloud 2021, pp. 127–132. IEEE (2021)

    Google Scholar 

  31. Liu, Y., Liu, J., Salles, M.A.V., Zhang, Z., Li, T., Bin, H., Henglein, F., Rongxing, L.: Building blocks of sharding blockchain systems: Concepts, approaches, and open problems. Comput. Sci. Rev. 46, 100513 (2022)

    Article  MathSciNet  Google Scholar 

  32. Liu, Y., Liu, J., Hei, Y., Xia, Yu., Wu, Q.: A secure cross-shard view-change protocol for sharding blockchains. In: Baek, J., Ruj, S. (eds.) ACISP 2021. LNCS, vol. 13083, pp. 372–390. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90567-5_19

    Chapter  Google Scholar 

  33. Hei, Y., Liu, J., Feng, H., Li, D., Liu, Y., Qianhong, W.: Making MA-ABE fully accountable: a blockchain-based approach for secure digital right management. Comput. Networks 191, 108029 (2021)

    Article  Google Scholar 

  34. Hei, Y., Li, D., Zhang, C., Liu, J., Liu, Y., Qianhong, W.: Practical agentchain: a compatible cross-chain exchange system. Future Gener. Comput. Syst. 130, 207–218 (2022)

    Article  Google Scholar 

  35. Hei, Y., Liu, Y., Li, D., Liu, J., Qianhong, W.: Themis: an accountable blockchain-based P2P cloud storage scheme. Peer-to-Peer Netw. Appl. 14(1), 225–239 (2021)

    Article  Google Scholar 

  36. Xie, J., et al.: A survey of blockchain technology applied to smart cities: research issues and challenges. IEEE Commun. Surv. Tutorials 21(3), 2794–2830 (2019)

    Article  MathSciNet  Google Scholar 

  37. Gai, K., Guo, J., Zhu, L., Shui, Yu.: Blockchain meets cloud computing: a survey. IEEE Commun. Surveys Tutorials 22(3), 2009–2030 (2020)

    Article  Google Scholar 

  38. Beck, R., Avital, M., Rossi, M., Thatcher, J.B.: Blockchain technology in business and information systems research. Bus. Inf. Syst. Eng. 59(6), 381–384 (2017). https://doi.org/10.1007/s12599-017-0505-1

    Article  Google Scholar 

  39. Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)

    Google Scholar 

  40. Kitaev, N., Kaiser, Ł., Levskaya, A.: Reformer: the efficient transformer. arXiv preprint arXiv:2001.04451 (2020)

  41. Qiu, M., Li, H., Sha, E.: Heterogeneous real-time embedded software optimization considering hardware platform. In: ACM SAC, pp. 1637–1641 (2009)

    Google Scholar 

  42. Qiu, M., Sha, E., Liu, M., Lin, M., Hua, S., Yang, L.: Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. JPDC 68(4), 443–455 (2008)

    MATH  Google Scholar 

  43. Qi, D., Liu, M., Qiu, M., Zhang, S.: Exponential synchronization of general discrete-time chaotic neural networks with or without time delays. IEEE Trans. Neural Networks 21(8), 1358–1365 (2010)

    Article  Google Scholar 

  44. Li, J., Qiu, M., et al.: Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads. ACM Trans. Embedded Comput. Sys. (TECS) 12(2), 1–22 (2013)

    Article  MathSciNet  Google Scholar 

  45. Shao, Z., Wang, M., et al.: Real-time dynamic voltage loop scheduling for multi-core embedded systems. IEEE Trans. Circuits Syst. II 54(5), 445–449 (2007)

    Article  Google Scholar 

  46. Qiu, M., Ming, Z., et al.: Three-phase time-aware energy minimization with DVFS and unrolling for chip multiprocessors. J. Syst. Archit. 58(10), 439–445 (2012)

    Article  Google Scholar 

  47. Tao, L., Golikov, S., Gai, K., Qiu, M.: A reusable software component for integrated syntax and semantic validation for services computing. In: IEEE Symposium on Service-Oriented System Engineering, pp. 127–132 (2015)

    Google Scholar 

  48. Zhang, K., Kong, J., Qiu, M., Song, G.: Multimedia layout adaptation through grammatical specifications. Multimedia Syst. 10(3), 245–260 (2005)

    Article  Google Scholar 

  49. Qiu, M., Zhang, K., Huang, M.: Usability in mobile interface browsing. Web Intell. Agent Syst. 4(1), 43–59 (2006)

    Google Scholar 

  50. Zhang, L., Qiu, M., Tseng, W., Sha, E.: Variable partitioning and scheduling for mpsoc with virtually shared scratch pad memory. J. Signal Proc. Syst. 58(2), 247–265 (2018). https://doi.org/10.1007/s11265-009-0362-3

    Article  Google Scholar 

  51. Qiu, M., et al.: RNA nanotechnology for computer design and in vivo computation. Philos. Trans. Roy. Soc. A 371(2000), 20120310 (2013)

    Article  Google Scholar 

  52. Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. FGCS 87, 772–781 (2018)

    Article  Google Scholar 

  53. Qiu, M., Su, H., Chen, M., Ming, Z., Yang, L.: Balance of security strength and energy for a PMU monitoring system in smart grid. IEEE Commun. Mag. 58(5), 142–149 (2012)

    Article  Google Scholar 

  54. Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327–10335 (2020)

    Article  Google Scholar 

  55. Gao, X., Qiu, M.: Energy-based learning for preventing backdoor attack. KSEM 3, 706–721 (2022)

    Google Scholar 

Download references

Acknowledgement

This paper is supported by the National Natural Science Foundation of China (U21B2021, 62202027, 61972018, 61932014).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yizhong Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ding, P. et al. (2023). Indistinguishable Obfuscated Encryption and Decryption Based on Transformer Model. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28124-2_65

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28123-5

  • Online ISBN: 978-3-031-28124-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics