期刊文献+

隐私保护的可验证多元多项式外包计算方案 被引量:6

Verifiably private outsourcing scheme for multivariate polynomial evaluation
下载PDF
导出
摘要 随着云计算的发展和大数据时代的到来,如何对隐私数据进行外包计算且有效验证计算结果具有重要的现实意义。基于多线性映射和同态加密方案,提出了可验证的多元多项式外包计算方案,用户可准确验证外包计算结果的正确性。方案在标准模型中可证安全,且多项式函数和用户输入对于服务器都是保密的。分析表明,用户计算量远小于服务器的计算代价以及直接计算多项式函数。 With the development of cloud computing and big data, it had important practical significance for how to out- source private data and verify the computing result efficiently. A verifiably outsourcing scheme for multivariate polyno- mial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly. The proposed scheme is provably secure without random oracles and the multivariate polyno- mial itself and the input of the function are private for the server. Moreover, the cost of the user is much smaller than that of the server, and it is much smaller than that of computing the multivariate polynomial directly.
出处 《通信学报》 EI CSCD 北大核心 2015年第8期23-30,共8页 Journal on Communications
基金 国家自然科学基金资助项目(61202367) 教育部高校博士点基金资助项目(20120073110094) 上海市自然科学基金资助项目(12ZR1443700) 上海市教委创新基金资助项目(14YZ020)~~
关键词 云计算 大数据 多元多项式 可验证外包计算 多线性映射 cloud computing big data multivariate polynomial verifiable outsourcing computing multilinear map
  • 相关文献

参考文献15

  • 1GENNARO R, GENTRY C, PARNO B. Non-interactive verifiable computing: outsourcing computation to untrusted workers[A]. CRYPTO 2010[C], 2010.465-482.
  • 2CHUNG K M, KALAI Y, VADHAN S P. Improved delegation of computation using fully homomorpbic encryption[A]. CRYPTO 2010[C]. 2010. 483-501.
  • 3APPLEBAUM B, ISHAI Y, KUSHILEVITZ E. From secrecy to soundness: efficient verification via secure computation[A]. ICALP 2010[C]. 2010. 152-163.
  • 4PARNO B, RAYKOVA M, VAIKUNTANATHAN V. How to delegate and verify in public: verifiable computation from atibute-based en- cryption[A]. TCC 2012, LNCS 7194[C]. 2012. 422-439.
  • 5CHOI S, KATZ J, KUMARESAN R, CID C. Multi-client non-interactive verifiable computation[A]. TCC 2013, LNCS 7785[C]. 2013.499-518.
  • 6CHEN X, LI J, MA J, TANG Q, LOU W. New algorithms for secure outsourcing of modular expunentiations[A]. ESORICS 2012, LNCS 7459[C]. 2012. 541-556.
  • 7HOHENBERGER S, LYSYANSKAYA A, How to securely outsourcc cryptographic computations[A]. TCC 2005. LNCS 3378[C]. 2005. 264-282.
  • 8ZHANG L, NAINI R S. Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps[A]. CANS 2013, LNCS 8257[C]. 2013.329-348.
  • 9GREEN M, HOHENBERGER S, WATERS B. Outsourcing thedecryption of ABE ciphertexts[EB/OL], http://static.usenix.org/events/ sec 1 l/tech/full-papers/Green.pdf.
  • 10LAI J, DENG R H, GUAN C, WENG J. Attribute-based encryption with verifiable outsourccd decryption[J]. IEEE Transactions on Infor- mation Forensics and Security, 2013, 8(8): 1343-1354.

同被引文献83

引证文献6

二级引证文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部