Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations"

被引:3
作者
Cao, Zhengjun [1 ]
Liu, Lihua [2 ]
机构
[1] Shanghai Univ, Dept Math, Shangda Rd 99, Shanghai, Peoples R China
[2] Shanghai Maritime Univ, Dept Math, Haigang Ave 1550, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; linear equations; homomorphic encryption; Paillier's encryption;
D O I
10.1109/TPDS.2016.2531669
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We remark that the Wang et al.'s scheme [IEEE Transanction Parallel Distributed Systems, 24 (6), 1172-1181, 2013] fails because the involved homomorphic encryption system is invalid in the context of the scheme. This is due to that the general arithmetic over the field R (the outsourced linear equations are constrained to the field) is not compatible with the modular arithmetic over any finite domain (the homomorphic encryption is constrained to the domain).
引用
收藏
页码:1551 / 1552
页数:2
相关论文
共 4 条
[1]  
[Anonymous], 2002, APPROXIMATION THEORY
[2]  
Cao Z. J., 2015, WEAKNESS FULLY HOMOM
[3]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1560, P223
[4]   Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations [J].
Wang, Cong ;
Ren, Kui ;
Wang, Jia ;
Wang, Qian .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (06) :1172-1181