期刊文献+

可完全验证的双线性对运算外包算法 被引量:6

New algorithms for verifiable outsourcing of bilinear pairings
原文传递
导出
摘要 双线性对运算是基于对的密码学中最昂贵的运算.基于两个不可信的服务器,本文首先提出了单个双线性对运算的外包计算方案.用户不需要执行任何复杂度高的运算,如标量乘、模乘运算等.本文还提出了多个双线性对运算的外包方案,效率远远高于调用单个对运算外包方案.在所提的两个算法中,如果服务器不诚实,用户均能以概率1检测到错误.基于两个算法,本文还提出了可外包解密的基于身份匿名加密方案和签名外包验证的基于身份签名方案. It is well known that the computation of bilinear pairing is the most expensive operation in pairingbased cryptography. In this paper, we first propose a secure verifiable outsourcing algorithm of single bilinear pairing based on two servers in the one-malicious model. The outsourcer need not execute any expensive operations, such as scalar multiplication or modular exponentiation. We also present another verifiable outsourcing algorithm for multiple bilinear pairings. This algorithm is much more efficient than the repeated invocation of the outsourcing algorithm of single bilinear pairing. Both of the proposed algorithms enable the outsourcer to detect any failure with a probability of 1 if one of the servers misbehaves. Finally, we utilize the proposed algorithms as two subroutines to achieve an anonymous identity-based encryption(AIBE) scheme with outsourced decryption and an identity-based signature(IBS) scheme with outsourced verification.
出处 《中国科学:信息科学》 CSCD 北大核心 2016年第7期855-869,共15页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:61202367 61572309 61572246) 教育部博士点基金(批准号:20120073110094) 上海市教委创新基金(批准号:14YZ020) 河南省科技创新人才支持计划和河南省高校科技创新人才支持计划(批准号:13HASTIT042)资助项目
关键词 云计算 可验证 外包计算 双线性对 模指数运算 基于身份加密 cloud computing verifiable outsourcing computation bilinear pairing modular exponentiation identity-based encryption
  • 相关文献

参考文献30

  • 1Chen X F, Li J, Ma J F, et al. New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parall Distrib Syst, 2014, 25:2386 2396.
  • 2Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th Annual Conference on Advances in Cryptology. Berlin: Springer, 2010. 465-482.
  • 3Chung K, Kalai Y, Vadhan S. Improved delegation of computation using fully homomorphic encryption. In: Proceed- ings of the 30th Annual Conference on Advances in Cryptology. Berlin: Springer, 2010. 483 501.
  • 4Chaum D, Pedersen T. Wallet databases with observers. In: Proceedings of 12th Annual Conference on Advances in Cryptology. Berlin: Springer, 1992. 89-105.
  • 5Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations. In: Proceedings of the 2nd International Conference on Theory of Cryptography. Berlin: Springer, 2005. 264-282.
  • 6Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX Conference on Security. New York: ACM, 2011. 34.
  • 7Lai J Z, Deng R H, Guan C W, et al. Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Foren Secur, 2013, 8:1343-1354.
  • 8Golle P, Mironov I. Uncheatable distributed computations. In: Proceedings of the Cryptographers' Track at RSA Conference. Berlin: Springer, 2001. 425 440.
  • 9Atallah M, Pantazopoulos K, Rice J, et al. Secure outsourcing of scientific computations. Adv Comput, 2001, 54: 216-272.
  • 10Boneh D, Franklin M. Identity-based encryption from the Well pairings. In: Proceedings of the 21st Annual Interna- tional Cryptology Conference on Advances in Cryptology. London: Springer, 2001. 213 229.

同被引文献22

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部