首页 | 官方网站   微博 | 高级检索  
     

基于双服务器模型的可公开验证多元多项式外包计算方案
引用本文:罗小双,杨晓元,李聪,王绪安.基于双服务器模型的可公开验证多元多项式外包计算方案[J].计算机应用,2018,38(2):321-326.
作者姓名:罗小双  杨晓元  李聪  王绪安
作者单位:1. 武警工程大学 密码工程学院, 西安 710086;2. 网络与信息安全武警部队重点实验室, 西安 710086
基金项目:国家自然科学基金资助项目(U1636114,61572521);国家密码发展基金资助项目(MMJJ20170112);国家重点研发计划项目(2017YFB0802002);陕西省自然科学基金资助项目(2016JQ6037)。
摘    要:结合云安全外包计算中的隐私保护问题,针对任意多元多项式函数的外包计算,利用同态加密算法和多线性映射,构造了基于双服务器模型的可公开验证外包计算方案。该方案能够保证多项式函数输入与输出的隐私性和安全性,用户或者任意第三方都可以对云服务器计算的结果进行验证,实现了可公开验证性和可用性。云返回给用户的结果处于密文状态,只有拥有解密密钥的用户才能够输出最终的结果,一定程度上保证了计算结果的安全性。分析结果表明,该方案在标准模型下能够达到输入的选择明文攻击(CPA)安全,用户的计算代价远远小于服务器以及直接计算多项式函数的计算代价。

关 键 词:外包计算  多元多项式  同态加密  多线性映射  
收稿时间:2017-08-21
修稿时间:2017-09-13

Publicly verifiable outsourced computation scheme for multivariate polynomial based on two-server model
LUO Xiaoshuang,YANG Xiaoyuan,LI Cong,WANG Xu'an.Publicly verifiable outsourced computation scheme for multivariate polynomial based on two-server model[J].journal of Computer Applications,2018,38(2):321-326.
Authors:LUO Xiaoshuang  YANG Xiaoyuan  LI Cong  WANG Xu'an
Affiliation:1. Engineering College of the Cryptography, Engineering University of the Armed Police Force, Xi'an Shaanxi 710086, China;2. Key Laboratory of Network & Information Security under the Chinese Armed Police Force, Xi'an Shaanxi 710086, China
Abstract:Combining with the privacy-preserving problem of secure outsourced computation in the cloud and aiming at arbitrary outsourcing multivariate polynomials, a publicly verifiable outsourced computation scheme based on two-server model was constructed by homomorphic encryption and multilinear mapping. The scheme can guarantee the privacy and security of inputs and outputs of polynomial functions, and reach the goal that users or any third party can verify the correctness of the results, thus achieving open verification and availability. The results returned by the cloud are in the state of encryption, only users who have decryption key can output the final results, which can ensure the security of computation. Besides, the scheme can achieve Chosen Plaintext Attack (CPA) security of inputs in the standard model, and the user's computational cost is much less than that of the server and direct computation.
Keywords:outsourced computation                                                                                                                        multivariate polynomial                                                                                                                        homomorphic encryption                                                                                                                        multilinear mapping
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号