浏览全部资源
扫码关注微信
1. 浙江警察学院计算机与信息技术系,浙江 杭州 310053
2. 浙江工业大学信息工程学院,浙江 杭州310023
[ "丁伟杰(1980-),男,浙江警察学院计算机与信息技术系讲师,浙江工业大学信息工程学院博士生,主要研究方向为网络安全、公安信息技术应用等。" ]
网络出版日期:2018-01,
纸质出版日期:2018-01-20
移动端阅览
丁伟杰. 基于单服务器的模指数安全外包计算方案[J]. 电信科学, 2018,34(1):80-86.
Weijie DING. Secure outsource computing scheme of modular exponentiation based on single server[J]. Telecommunications science, 2018, 34(1): 80-86.
丁伟杰. 基于单服务器的模指数安全外包计算方案[J]. 电信科学, 2018,34(1):80-86. DOI: 10.11959/j.issn.1000-0801.2018001.
Weijie DING. Secure outsource computing scheme of modular exponentiation based on single server[J]. Telecommunications science, 2018, 34(1): 80-86. DOI: 10.11959/j.issn.1000-0801.2018001.
目前,在离散对数密码协议中,模指数外包计算方案大部分都是针对素数的,很少有有关合数的研究成果。并且大多数模指数外包计算方案都是基于双服务器的,该类方案通常要求两个服务器中至少有一个是诚实的,但是在实际环境中可能并不存在完全可信的云服务器。基于单个不可信服务器模型提出了一个新的复合模指数安全外包计算方案。该方案采用新的数学分割方式,能够保证底数和指数的隐私性。与已有方案相比,该方案的外包计算结果可验证率也有很大程度的提高,用户能够以119/120的概率检测出错误结果。
At present
in discrete-log based cryptographic protocols
most of the computational models of modular exponentiation are for primes
while less work has been done for composite.What’s more
most schemes are based on two servers
in which it requires at least one server to be honest.However
there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method
it could ensure the privacy of the base and exponentiation.Compared with the existing schemes
the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.
汪来富 , 沈军 , 金华敏 . 云计算应用安全研究 [J ] . 电信科学 , 2010 , 26 ( 6 ): 67 - 70 .
WANG L F , SHEN J , JIN H M . Research on application security of cloud computing [J ] . Telecommunications Science , 2010 , 26 ( 6 ): 67 - 70 .
何明 , 郑翔 , 赖海光 , 等 . 云计算技术发展及应用探讨 [J ] . 电信科学 , 2010 , 26 ( 5 ): 42 - 46 .
HE M , ZHENG X , LAI H G , et al . Development and application of cloud computing technology [J ] . Telecommunications Science , 2010 , 26 ( 5 ): 42 - 46 .
REN K , WANG C , WANG Q . Security challenges for the public cloud [J ] . IEEE Internet Computing , 2012 , 16 ( 1 ): 69 - 73 .
MEZGAR I , RAUSCHECKER U . The challenge of networked enterprises for cloud computing interoperability [J ] . Computers in Industry , 2014 , 65 ( 4 ): 657 - 674 .
陈克非 , 翁健 . 云计算环境下数据安全与隐私保护 [J ] . 杭州师范大学学报(自然科学版) , 2014 ( 6 ): 561 - 570 .
CHEN K F , WEN J . Data security and privacy protection in cloud computing environment [J ] . Journal of Hangzhou Normal University (Natural Science Edition) , 2014 ( 6 ): 561 - 570 .
何明 . 云计算在公安电子数据取证技术中的研究与应用 [J ] . 网络安全技术与应用 , 2015 ( 7 ): 88 - 90 .
HE M . Research and application of cloud computing in police electronic data forensics [J ] . Network Security Technology and Application , 2015 ( 7 ): 88 - 90 .
农卫涛 . 云计算在公安信息化建设中的应用 [J ] . 数字通信世界 , 2016 ( 1 ): 97 , 103 .
NONG W T . Application of cloud computing in police information construction [J ] . Digital Communications World , 2016 ( 1 ): 97 , 103 .
CHAUM D , PEDERSEN T P . Wallet databases with observers [C ] // International Cryptology Conference on Advances in Cryptology,August 16-20,1992 , London,UK .[S.l.:s.n ] 1992 : 89 - 105 .
HOHENBERGER S , LYSYANSKAYA A . How to securely outsource cryptographic computations [J ] . Theory of Cryptography , 2005 ( 3378 ): 264 - 282 .
CHEN X , LI J , MA J , et al . New algorithms for secure outsourcing of modular exponentiations [J ] . IEEE Transactions on Parallel & Distributed Systems , 2014 , 25 ( 9 ): 2386 - 2396 .
YE J , CHEN X , MA J . An improved algorithm for secure outsourcing of modular exponentiations [C ] // IEEE International Conference on Advanced Information Networking and Applications Workshops,March 24-27,2015,Gwangiu,South Korea . Piscataway:IEEE Press , 2015 : 73 - 76 .
DIJK M , CLARKE D , GASSEND B , et al . Speeding up exponentiation using an untrusted computational resource [J ] . Designs Codes & Cryptography , 2006 , 39 ( 2 ): 253 - 273 .
WANG Y , WU Q , WONG D S , et al . Securely outsourcing exponentiations with single untrusted program for cloud storage [C ] // European Symposium on Research in Computer Security,September 7-11,2014,Wroclaw,Poland .[S.l.:s.n ] , 2014 : 326 - 343 .
BOYKO V , PEINADO M , VENKATESAN R . Speeding up discrete log and factoring based schemes via precomputations [C ] // International Conference on the Theory and Applications of Cryptographic Techniques,May 31-June 4,1998,Espoo,Finland .[S.l.:s.n ] 1998 : 221 - 235 .
0
浏览量
868
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构