期刊文献+

探析多秘密共享与云外包的结合

Exploration of the Combination of Multi Secret Sharing and Cloud Outsourcing
下载PDF
导出
摘要 2010年首次以白皮书的形式提出了"云外包"的概念。云外包指的是基于云计算商业模式应用的服务外包资源与平台的总称。云外包的提出将会使服务外包和IT服务业发生巨大的变化,其可以利用自身的资源池减少租户的运算量。而在多秘密解密阶段需要大量且复杂的计算,现在将多秘密共享与云外包结合,可以大大减少运算量。 The concept of"Cloud outsourcing" was firstly proposed floorboard of services outsourcing resources and platforms based on in a form of white paper in 2010.Cloud outsourcing means the cloud computing business model application .Proposing Cloud outsourcing will make the service outsourcing and IT service industry change a lot, and Cloud outsourcing would reduce the computing capacity of the tenant bY using its own resource pool.And there are a large number of complex calculations in the multi secret decryption phase, now we combine multi secret sharing with Cloud outsourcing, which can reduce calculations greatlv.
出处 《无线互联科技》 2016年第12期77-79,共3页 Wireless Internet Technology
关键词 云外包 多秘密共享 解密 cloud outsourcing multi secret sharing decryption
  • 相关文献

参考文献10

  • 1卢开澄.计算机密码学[M].北京:清华大学出版社,1998.. 被引量:68
  • 2冯登国,裴定一.密码学引导[M].北京:科学出版社,1999. 被引量:3
  • 3周琴琴..基于Hash函数的MD5和SHA-1加密算法研究及其硬件实现[D].安徽大学,2012:
  • 4李顺东,窦家维,王道顺.同态加密算法及其在云安全中的应用[J].计算机研究与发展,2015,52(6):1378-1388. 被引量:42
  • 5CRAIG G. Fully Homomorphic Encryption Using Ideal Lattices[J].ACM STC, 2009(9): 169-178. 被引量:1
  • 6CHIEN H Y, JAN J K, TSENG V M.A Practical (t, n) Multi-secret Sharing Scheme[J].Transactions on Fundamentals,2000(12): 2762-2765. 被引量:1
  • 7SHAMIR A. How to Share a Secret[J].Communications of the ACM,1979(11): 213, 612. 被引量:1
  • 8He J, DAWSON E.Multisecret-sharing Scheme Based on One-way Function[J].Electronics Letters,1995(2): 93-94. 被引量:1
  • 9YANG C C, CHANG T Y, HWANG M S.A(t, n)Multi-secret Sharing Scheme[J].Applied Mathemetics and Computation, 2004(2): 483-490. 被引量:1
  • 10PANG L J, WANG Y M.A and Computation, 2005(2) New(t,n) Multi-secret Sharing Schme Based on Shamir' s Secret Sharing[J].Applied Mathematics :840-848. 被引量:1

二级参考文献65

  • 1Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berkeley view of cloud computing [EB/OL]. [2014-07-02]. http://x-integrate, de/x-in-cms, nsf]id/DE Von Regenmachern und Wolkenbruechen _-_ Impact _ 2009 _ Nachlese/MYMfile/ abovetheclouds, pdf. 被引量:1
  • 2Harauz J, Kaufman L M, Potter B. Data security in the world of cloud computing [J]. IEEE Security & Privacy, 2009, 7(4): 61-64. 被引量:1
  • 3McMillan R. Cloud computing a ' security nightmare', says Cisco CEO [EB/OL]. [ 2014- 07 -02 ]. http://www. networkworld, comnews/2009/042309-cloud-computing-a- security-nightmare, html. 被引量:1
  • 4Virvilis N, Dritsas S, Gritzalis D. Secure cloud storage; Available infrastructures and architectures review and evaluation [G] //LNCS 6863". Proc of Trust, Privacy and Security in Digital Business. Berlin~ Springer, 2011, 74-85. 被引量:1
  • 5Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms [J]. Foundations of Secure Computation, 1978, 4(11)~ 169-180. 被引量:1
  • 6Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978, 21(2) : 120-126. 被引量:1
  • 7Rappe R. Homomorphic cryptosystems and their applications [D]. Dortmund, Germany~ University of Dortmund, 2004. 被引量:1
  • 8E1Gamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Trans on Information Theory, 1985, 31 (4) ~ 469-472. 被引量:1
  • 9Paillier P. Public-key cryptosystems based on composite degree residuosity classes [G] //LNCS 1592: Proc of Eurocrypt'99. Berlin: Springer, 1999: 223-238. 被引量:1
  • 10Benaloh J. Verifiable sorer ballot elections [D]. New Haven, CT: Department of Computer Science, Yale University, 1988. 被引量:1

共引文献110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部