Publicly Verifiable Delegation of Matrix Operation

被引:2
作者
Chen, Lu [1 ]
Zhu, Yan-Qin [1 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou, Peoples R China
来源
2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CCBD) | 2015年
关键词
verifiable delegation; cloud computing; publicly verification; bilinear group; HOMOMORPHIC SIGNATURES;
D O I
10.1109/CCBD.2015.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Given the emergence of verifiable computation, it has made an approach to deal with the security bottlenecks in cloud computing. In this paper, we present two public verifiable delegation schemes for polynomials and matrix multiplication. Since cloud providers may not be trusted, a weak client will outsource a function f and encoded input sigma(x). After evaluating, the server returns related result along with signature w guarantying the correctness of computation. Roughly speaking, our constructions are mainly based on decision Diffie-Hellman assumption and bilinear group. Comparing with previous solutions, ours could preserve the input privacy and achieve publicly efficient verification for univariate polynomial evaluation and then extend to matrix multiplication.
引用
收藏
页码:377 / 384
页数:8
相关论文
共 19 条
[1]  
[Anonymous], 2011, 2011456 CRYPT EPR AR
[2]  
Atallah M.J., 1996, SECURE OUTSOURCING S
[3]  
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[4]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[5]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2612, P98
[6]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[7]  
Catalano D, 2014, LECT NOTES COMPUT SC, V8616, P371, DOI 10.1007/978-3-662-44371-2_21
[8]  
Catalano D, 2013, LECT NOTES COMPUT SC, V7785, P680, DOI 10.1007/978-3-642-36594-2_38
[9]  
Chung KM, 2010, LECT NOTES COMPUT SC, V6223, P483, DOI 10.1007/978-3-642-14623-7_26
[10]  
Fiore D., 2012, P 2012 ACM C COMP CO, P501