Improvement and applications of secure outsourcing of scientific computations

被引:8
作者
Yu, Jianhua [1 ]
Wang, Xueli [1 ]
Gao, Wei [2 ]
机构
[1] S China Normal Univ, Sch Math Sci, Guangzhou, Guangdong, Peoples R China
[2] Lu Dong Univ, Sch Math & Stat, Yantai, Peoples R China
基金
中国国家自然科学基金;
关键词
Securely outsourcing; Scientific computations; Cloud computing; Equation; Disguise;
D O I
10.1007/s12652-015-0280-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Methods for solving equations play an important role in scientific computation and cryptography. Usually, many cryptographic protocols and scientific computation problems can be reduced to some differential equation or linear equation systems. However, the above mentioned scientific computation needs very much computation resource. Hence, super computer technology such as grid technology, cloud computation is slow to emerge. Cloud computation has strong computation power and helps users to deals with this very difficult computation. For security, we need improve some conditional computation methods for numerical or scientific outsourcing computation. In this paper some special algebraic and differential equations are studied. And some new practical verifiably secure outsourcing protocols are designed, which are better than the previous methods in the following terms. First, they can protect more secret parameters for abstract equations. Second, based on previous methods, random function can be chosen in the different ways and hence better security and privacy is obtained. Third, for nonlinear equations, we find more applications and new methods. These tools help us to find more methods to deal with more linear or nonlinear equations. At last, some verifiably secure outsourcing computation for integral computation is designed. These results help to outsource the computation for solving differential equations.
引用
收藏
页码:763 / 772
页数:10
相关论文
共 18 条
[1]  
Akimanaa R, 2007, 6 WSEAS INT C SOFTW, P63
[2]  
Atallah M, 1996, CSDTR96074 PURD U DE
[3]  
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[4]  
Atallah MJ, 2005, LECT NOTES COMPUT SC, V3424, P63
[5]  
Atallah MJ, 2001, ADV COMPUT, V54, P215
[6]   Private and Cheating-Free Outsourcing of Algebraic Computations [J].
Benjamin, David ;
Atallah, Mikhail L. .
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, :240-245
[7]  
Boneh D., 2000, Progress in Cryptology - INDOCRYPT 2000. First International Conference in Cryptology in India. Proceedings (Lecture Notes in Computer Science Vol.1977), P271
[8]  
Cao TJ, 2006, LECT NOTES COMPUT SC, V3903, P314
[9]  
Chen Y, 2005, SEC MOB AD HOC NETW, P27
[10]   Uncheatable grid computing [J].
Du, WL ;
Jia, J ;
Mangal, M ;
Murugesan, M .
24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, :4-11