期刊文献+

安全高效的可验证大型线性方程组求解外包计算方案 被引量:2

Secure efficient and verifiable large linear equations solve outsourcing computing scheme
下载PDF
导出
摘要 针对目前大型线性方程组求解在外包计算中遇到的用户信息泄露、计算结果被篡改等问题,提出一种安全高效的可验证外包计算方案。通过随机置换和线性方程组的恒等变换,构造了新的具备相似解的线性方程组,避免了当前数据伪装方案易受求解公因式法攻击的问题,同时提高了客户端的验证效率,降低了空间复杂度。性能分析表明,该方案具有极高的效率。 A secure, efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results, which were encountered while solving large-scale linear equations in outsourcing computation. A new linear equation with similarity solutions was constructed based on the constant transformation between random permutation and linear equations. It avoids the problem that the current data camouflage scheme is easily attacked by solving common factor method. It also improves the verification effciency and reduces the complexity of space. The performance analysis shows that the scheme is highly efficient.
作者 张兴兰 刘祥
出处 《网络与信息安全学报》 2017年第6期1-7,共7页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61272044)~~
关键词 云外包计算 解线性方程组 可验证性 outsourcing cloud computing solving linear equations verifiability
  • 相关文献

参考文献5

二级参考文献64

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009. 被引量:1
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009. 被引量:1

共引文献1093

同被引文献53

引证文献2

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部