摘要
为了解决外包数据和授权计算的安全性问题,近年来可验证授权计算理论又重新受到人们的关注和青睐。文中重点描述了在不可信环境下可验证授权计算技术是如何解决外包数据和授权计算的可验证性问题,并给出了可验证授权计算方案的形式化定义。首先采用不同分类方法对现有研究方案进行总结与归纳,指出现有研究方案的特点、所采用关键技术及不足之处;然后从功能和性能两个方面对方案进行对比分析;最后结合应用热点,从不同应用方向展望了该领域的研究趋势和发展前景。
In order to resolve safety issue of outsoureing data and verifiable delegation of computation, the theory of veri- fiable computation starts to draw public's attention recently. This paper illustrated how verifiable delegation of compu- tation technique resolves above verifiability issues and provided formal ddinition of verifiable computation. This is the first time to summarize and induce current schemes from different classification methods, and illustrate key techniques and deficiency. Then this paper compared and analyzed these schemes from two aspects of function and performance. Fi- nally, combined with the application hotspots, we forecasted tendency and development perspective in this research area from different application directions.
出处
《计算机科学》
CSCD
北大核心
2015年第11期1-7,共7页
Computer Science
基金
国家"八六三"高技术研究发展计划基金项目(2012AA012704)
河南省科技创新人才计划(114200510001)资助
关键词
可验证授权计算
云计算
安全外包数据
同态加密
同态认证码
可认证数据结构
Verifiable delegation of computation, Cloud computing, Secure data outsourcing, Homomorphic encryption,Homomorphic MACs, Authenticated data structures