Improving data security for a hybrid society

Issue 8 2022 News & Events

From financial transactions to the use of communication applications with artificial intelligence, our data is frequently transmitted from personal devices to the cloud. Handling this encrypted data in a secure but computationally efficient manner is becoming increasingly important in our data-driven society. Now, researchers from Tokyo University of Science develop a method that can perform computations with encrypted data faster and at a lower cost than conventional methods, while also improving security.

Society 5.0 envisions a connected society driven by data shared between people and artificial intelligence devices connected via the Internet of Things (IoT). While this can be beneficial, it is also essential to protect the privacy of data for secure processing, transmission, and storage. Currently, homomorphic encryption and secret sharing are two methods used to compute sensitive data while preserving its privacy.

Homomorphic encryption involves performing computations on encrypted data on a single server. While being a straightforward method, it is computationally intensive. On the other hand, secret sharing is a fast and computationally efficient way to handle encrypted data. In this method, the encrypted data or secret input is divided and distributed among multiple servers, each of which performs a computation such as multiplication with its piece of data.

The results of these computations are then used to reconstruct the original data. In such a system, the secret can only be reconstructed if a certain number of pieces, known as the threshold, are available. Therefore, if the servers are managed by a single organisation, there is a higher risk that the data could be compromised if the required number of pieces falls into the hands of an attacker.

To improve data security, it is ideal for multiple companies to manage computing servers in a decentralised manner such that each server is operated independently. This approach reduces the likelihood of an attacker gaining access to the threshold number of pieces required to reconstruct a secret. However, implementing this system can be challenging in practice due to the need for a fast communication network to allow geographically separated servers to communicate with each other.

This leads to an important question: is there a way to maintain data integrity without having to rely on independent servers, and without incurring a high computational cost?

In a study published on 14 November 2022, in Volume 10 of IEEE Access, Professor Keiichi Iwamura and Assistant Professor Ahmad A. Aminuddin of Tokyo University of Science, Japan, introduced a new secure computation method where all the computations are performed on a single server without a significant computational cost.

The system consists of a trusted third party (TTP), one computing server, four players who provide secret inputs to the server, and one player who restores the computation result. The TTP is a neutral organisation that generates random numbers which are provided to the server (these are known as shares) and the players in certain combinations. These random numbers are used to encrypt the data.

Each player then performs a computation with the random numbers and generates secret inputs which are sent to a server. The server then uses the shares and secret inputs, along with new values computed by the TTP, to perform a series of computations, the results of which are sent to a final player who reconstructs the computation result (Figure 1). This method allows for the decentralised computation of encrypted data while still performing the computation on a single server.

“In our proposed method, we realise the advantage of homomorphic encryption without the significant computational cost incurred by homomorphic encryption, thereby devising a way to securely handle data,” says Prof. Iwamura, who led the study and is the paper’s first author. Moreover, the method can also be modified such that the random numbers generated by the TTP can be stored securely by a Trusted Execution Environment (TEE), which is a secure area in a device's hardware (processor). As the TEE takes over the role of the TPP during the subsequent computational process, it reduces the communication time and improves the speed at which the encrypted data is handled.

As our society becomes more reliant on the internet, we are moving towards storing data on the cloud rather than locally. To securely manage the growing amount of data, it is important to have a reliable and efficient method of handling it. “We realise a method that addresses all the drawbacks of the aforementioned methods, and it is possible to realise faster and more secure computations than conventional methods using secret sharing,” says Assistant Prof. Aminuddin.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
The impact of misguided viral campaigns
News & Events Training & Education
For many years, traditional media have been perceived as slower, more inflexible, and less responsive compared to digital platforms. But in an ecosystem flooded with content, its value is becoming clearer: verification, context, and accountability.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.