期刊文献+

基于格密码的矩阵乘可验证计算方案 被引量:1

A Lattice-Based Verifiable Computation Schemefor Matrix Multiplication
下载PDF
导出
摘要 云计算近年来快速发展,其可信性成为了其能否广泛应用的重要决定因素,而可验证计算协议可以为用户提供以较小计算开销对服务器端返回的结果进行验证的途径。总结分析现有的针对大尺度矩阵乘的应用场景的可验证外包计算协议。基于现有的同态加密算法,构建一个用于外包计算矩阵乘的具有隐私保护的可验证外包计算协议。与国内外现有的相关协议相比,具有更低的本地计算开销。 With the great development of cloud computing,the trustworthiness has become a critical factor for the popularity of cloud computing. Verifiable computation gives the client a method to check the correctness of the result returned from the server with a smaller overhead. This paper covers the verifiable computation scheme for large-scale matrix multiplication. Based on an existing homomorphic encryption scheme,we construct a privacy-preserving verifiable computation scheme for large-scale matrix multiplication. Compared with the existing scheme,our scheme has smaller local overhead.
作者 陈泽 CHEN Ze(Schoolof Cyber Science and Engineering,Sichuan University,Chengdu 610207)
出处 《现代计算机》 2021年第16期84-87,共4页 Modern Computer
关键词 可验证计算 格密码 同态加密 Verifiable Computation Lattice-Based Encryption Homomorphic Encryption
  • 相关文献

参考文献1

二级参考文献83

  • 1Armbrust M. Fox A. Griffith R. et al. A view of cloud computing. Communications of the ACM. 2010. 53 (4): 50-58.
  • 2Chen Y. Paxson V. Katz R. What's new about cloud computing security? University of California at Berkley. Berkeley USA: Technical Report UCB/EECS-2010-5. 2010.
  • 3Ko R K L.Jagadpramana P. Mowbray M. et al. TrustCloud: A framework for accountability and trust in cloud computing/ / Proceedings of the 2nd IEEE World Congress on Services. Washington. USA. 2011: 584-588.
  • 4Sailer R. Zhang X.Jaeger T. van Doorn L. Design and implementation of a TCG- based integrity measurement architecture/ /Proceedings of the 13th USENIX Security Symposium. San Diego. USA. 2004: 223-238.
  • 5Sadeghi A-R. Schneider T. Winandy M. Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency/ /Proceedings of the 3rd Conference on Trust and Trustworthy Computing. Berlin. Germany. 2010: 417-429.
  • 6Parno B. McCuneJ M. Perrig A. Bootstrapping Trust in Modern Computers. Germany: Springer. 2011.
  • 7Seshadri A. Luk M. Shi E. et al. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms/ / Proceedings of the ACM Symposium on Operating Systems Principles(SOSP). Brighton. UK. 2005: 1-15.
  • 8Anderson D P. CobbJ. Korpela E. et al. SETI@home: An experiment in public-resource computing. Communications of the ACM. 2002. 45(1): 56-61.
  • 9Castro M. Liskov B. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems. 2002. 20(4): 398-461.
  • 10Haeberlen A. Kouznetsov P. Druschel P. PeerReview , Practical accountability for distributed systems//Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP). Stevenson. USA. 2007: 175-188.

共引文献16

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部