期刊文献+

支持多布尔函数的公开可验证委托方案

Publicly Verifiable Delegation of Multi-Boolean-Function
下载PDF
导出
摘要 提出了支持多布尔函数的公开可验证委托模型,并基于支持非单调访问结构的KP-ABE(Key Policy Attribute Based Encryption)方案给出了具体的构造.该方案能够使任何第三方对布尔函数的委托计算结果进行验证.与Parno等人的方案相比较,该方案通过将输入值与委托计算的布尔函数进行绑定,实现了一次系统建立后,可对多个布尔函数进行委托计算,提高了系统的效率. This paper proposes a publicly verifiable delegation model for multi-boolean-function, and gives a construction based on key-policy attribute based encryption (KP-ABE) supporting non-monotonic access structure. In our scheme, any third party could verify the result of the delegation for the boolean-function. Compared to the construction proposed by Pamo, our scheme is more efficient, since it can delegate multi-boolean-function after the setup of the system, by binding the inputs to the specific boolean-function.
作者 胡海英 商威
出处 《计算机系统应用》 2013年第7期122-126,共5页 Computer Systems & Applications
关键词 委托计算 公开可验证 布尔函数 属性加密 非单调访问结构 delegation of computation publicly verifiable boolean-function attribute based encryption non-monotonic access structure
  • 相关文献

参考文献15

  • 1Goldwasser S, Micali S, Charles R. The knowledge complexity of interactive proof-systems. Proc. of the 17th annual ACM symposium on Theory of computing. New York ACM, 1985: 291-304.
  • 2Goldwasser S, Kalai YT, Rothblum GN. Delegating computation: interactive proofs for muggles. Proc. of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM, 2008:113-122.
  • 3Kilian J. Improved efficient arguments. In: Coppersmith D, ed. Advances in Cryptology-CRYPTO'95. Berlin: Springer- Verlag, 1995: 311-324.
  • 4Kalai Y, Raz R. Probabilistically checkable arguments. In: Halevi S, ed. Advances in Cryptology-CRYPTO'09. Berlin: Springer-Vedag, 2009: 143-155.
  • 5Micali S. CS proofs. Proe. of the 35th annual symposium on Foundations of Computer Science. Washington DC: IEEE Computer Society, 1994: 436-453.
  • 6Smith SW, Weingart S. Building a high-performance, programmable secure coprocessor. Computer Networks, 1999, 31(8):831-860.
  • 7Hhenberger S, Lysyanskaya A. How to securely outsource cryptographic computations. In: Kilian J, ed. Theory of Cryptography. Berlin: Springer-Verlag, 2005: 264-282.
  • 8Gennaro R, Gentry C, Pamo B. Non-interactive veriabk computing: Outsourcing computation to untrusted workers In: Gennaro R, Gentry C, Parno B, eds. Advances ir Cryptology-CRYPTO'10. Berlin: Springer-Verlag, 2010: 46.-482.
  • 9Yao AC. Protocols for secure computations. Proc. of the 23rd Annual Symposium on Foundations of Computer Science. Washington DC: IEEE Computer Society, 1982: 160-164.
  • 10Gentry C. A fully homomorphic encryption scheme[Ph.D. Thesis]. Stanford University, 2009.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部