期刊文献+

可验证授权计算研究综述

Survey on Verifiable Delegation of Computation
下载PDF
导出
摘要 为了解决外包数据和授权计算的安全性问题,近年来可验证授权计算理论又重新受到人们的关注和青睐。文中重点描述了在不可信环境下可验证授权计算技术是如何解决外包数据和授权计算的可验证性问题,并给出了可验证授权计算方案的形式化定义。首先采用不同分类方法对现有研究方案进行总结与归纳,指出现有研究方案的特点、所采用关键技术及不足之处;然后从功能和性能两个方面对方案进行对比分析;最后结合应用热点,从不同应用方向展望了该领域的研究趋势和发展前景。 In order to resolve safety issue of outsoureing data and verifiable delegation of computation, the theory of veri- fiable computation starts to draw public's attention recently. This paper illustrated how verifiable delegation of compu- tation technique resolves above verifiability issues and provided formal ddinition of verifiable computation. This is the first time to summarize and induce current schemes from different classification methods, and illustrate key techniques and deficiency. Then this paper compared and analyzed these schemes from two aspects of function and performance. Fi- nally, combined with the application hotspots, we forecasted tendency and development perspective in this research area from different application directions.
出处 《计算机科学》 CSCD 北大核心 2015年第11期1-7,共7页 Computer Science
基金 国家"八六三"高技术研究发展计划基金项目(2012AA012704) 河南省科技创新人才计划(114200510001)资助
关键词 可验证授权计算 云计算 安全外包数据 同态加密 同态认证码 可认证数据结构 Verifiable delegation of computation, Cloud computing, Secure data outsourcing, Homomorphic encryption,Homomorphic MACs, Authenticated data structures
  • 相关文献

参考文献42

  • 1Benabbas S,Gennaro R’Vahlis Y. Verifiable delegation of com-putation over large datasets [M] // Advances in Cryptology ~CRYPTO2011, Springer ,2011:111-131.
  • 2Monrose F, Wyckoff P,Rubin A. Distributed execution with re-mote audit[C]//Proc. of ISOC NDSS. 1999.
  • 3Du W,Goodrich M T. Searching for high-value rare events withuncheatable grid computing[C] // ACNS. 2005 : 122-137.
  • 4Castro M, Liskov B. Practical Byzantine fault tolerance and pro-active recovery[J]. ACM Trans, on Comp. Sys. ,2002,20(4):398-461.
  • 5Carbunar B,Sion R. Uncheatable reputation for distributed com-putation markets[C] //Financial Cryptography. 2006:96-110.
  • 6Seshadri A,Luk M,Shi E,et al. Pioneer: Verifying integrity andguaranteeing execution of code on legacy platforms[C] // Proc.of the ACM SOSP. 2005.
  • 7Parno B,McCune J M,Perrig A. Bootstrapping Trust in ModernComputers[M]. Springer, 2011 : 35-50.
  • 8Chung K M,Kalai Y, Vadhan S P. Improved delegation of com-putation using fully homomorphic encryption [C] // CRYP-TO2010. LNCS 6223,2010:483-501.
  • 9Gennaro R,Gentry C,Parno B. Non-interactive verifiable com-puting: Outsourcing computation to untrusted workers [C]//CRYPTO 2010. LNCS 6223,2010:465-482.
  • 10Chen X, Li J, Susilo W. Efficient Fair Conditional Payments forOutsourcing Computations[J]. IEEE Transactions on Informa-tion Forensics and Security,2012,7(6) : 1687-1694.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部