[go: up one dir, main page]

Computer Science ›› 2015, Vol. 42 ›› Issue (10): 159-159.

Previous Articles     Next Articles

Secure Cloud Computing Service Protocols of Elementary Functions

LIU Xin, LI Shun-dong and CHEN Zhen-hua   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Cloud computing has become a powerful platform to solve many problems,while it has brought a lot of secure troubles.Cloud computing of elementary functions is the foundation and core of all cloud computation.We presented secure cloud computing service protocols for elementary functions.After transforming primitive parameters into other forms,we sent the complex parts to the cloud platform to compute.Using the well-accepted simulation paradigm,we proved that the protocols are secure.In the protocols,the service receiver can solve complicated computation problems with less computation sources.The protocols have lower computation and communication overheads.Therefore,the protocols are effective and feasible,and can become the based subprotocols of cloud computing.

Key words: Cloud computing,Secure computation service protocols,Elementary functions,Security

[1] Sun Cloud Architecture Introduction White Paper[EB/OL].http://developers.sun.com.cn/blog/functionalca/resource/sun_353cloudcomputing_chinese.pdf
[2] Feigenbaum J,Can Y.Take advantage of someone without ha-ving to trust him [C]∥Advances in Cryptology Crypto 1985.Berlin:Springer Verlag,1986:477-488
[3] Cramer R,Damgard I.Multiparty Computations,an Introduction[M]∥Advanced Courses in Mathematics,2005:41-87
[4] Yao A C.Protocols for secure computations [C]∥Proceedings of the 23th IEEE Symposium on Foundations of Computer Scie-nce.Washington,DC:IEEE Press,1982:160-164
[5] Goldreich O,Micali S,Wigderson A.How to play any mental game [C]∥Proceedings of the Nineteenth Annual ACM Confe-rence on Theory of Computing.Piscataway:IEEE Press,1987:218-229
[6] Goldwasser S.Multiparty computations:Past and present [C]∥Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing.NY:ACM Press,1997:1-6
[7] Du W L,Atallah M J.Privacy-preserving cooperative scientific computations[C]∥Proc.of the 14th IEEE Computer Security Foundations Workshop.Nova Scotia,Canada,2001:273-282
[8] Du W L,Atallah M J.Privacy-preserving cooperative statistical analysis[C]∥17th Annual Computer Security Applications Conference.New Orleans,Louisiana,USA,2001:102-110
[9] Du W L.A study of several specific secure two-party computation problems[D].West Lafayette:Purdue University,2000
[10] Du W L,Atallah M J.Secure multiparty computation problems and their applications:A review and open problems[C]∥Proceedings of New Security Paradigms Workshop 2001.NY:ACM Press,2001:11-20
[11] 罗文俊,李祥.双向零知识证明与初等函数两方保密计算[J].贵州大学学报(自然科学版),2004,21(1):36-42 Luo Wen-jun,Li Xiang.Two-directional Zero-Knowledge Proof and Secure Two-Party Computation[J].Journal of Guizhou University(Natural Science),2004,21(1):36-42
[12] 罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235 Luo Wen-Jun,Li Xiang.The secure multi-party protocol of matrix product and its application[J].Chinese Journal of Compu-ters,2005,28(7):1230-1235
[13] 肖倩,罗守山,陈萍,等.半诚实模型下安全多方排序问题的研究[J].电子学报,2008,34(4):709-714 Xiao Qian,Luo Shou-shan,Chen Ping,et al.Research on the Problem of Secure Multi-party Ranking Under Semi-honest Model[J].Acta Electronica Sinica,2008,34(4):709-714
[14] Goldreich O.The Fundamental of Cryptography:Basic Applications [M].London:Cambridge University Press,2004
[15] 李顺东.3个保密计算服务协议[J].陕西师范大学学报,2010,38(4):1-6 Li Shun-dong.Three specific secure computation service protocols[J].Journal of Shaanxi Normal University,2010,38(4):1-6
[16] Diffie W,Hellman M E.New direction in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):29-40
[17] 李顺东,王道顺.现代密码学:理论、方法与研究前沿[M].北京:科学出版社,2009 Li Shun-dong,Wang Dao-shun.Modern Cryptography:Theory,Method,Research Fronts[M].Beijing:Science Press,2009
[18] Rabaey J,Ammer J,Da Silva Jr J L.Pieo Radio:Ad-hoc wireless networking of ubiquitous low-energy sensor and monitor nodes[C]∥Proceedings of IEEE Computer Society Workshop on VLSI.April 2000:9-12
[19] William P,Brian F,Saul T,et al.LU Decomposition and its applications[M]∥2nd Numerical Recipes in Fortran:The Art of Scientific Computing.Cambridge:University Press,1992
[20] Lin H Y,Tzeng W G.An efficient solution to the millionaires problem based on homomorphic encryption [C]∥Proceedings of Applied Cryptography and Network Security 2005(LNCS3531).NY:Springer,2005:456-466
[21] 李顺东,戴一奇,尤启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):770-773 Li Shun-dong,Dai Yi-qi,You Qi-you.An Efficient Solution to Yao’s Millionaires Problem[J].Acta Electronica Sinica,2005,3(5):770-773
[22] Li S D,Wang D S,Dai Y Q,et al.Symmetric cryptographic solution to yao’s millionaires problem and an evaluation of secure multiparty computations [J].Information Sciences,2008,178(2):244-255
[23] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803 Li Shun-dong,Wang Dao-shun.Efficient Secure Multiparty Computation Based on Homomorphic Encryption[J].Acta Electronica Sinica,2013,41(4):798-803
[24] Malek B,Miri A.Combining attribute-based and access systems[C]∥Proc.of 12th IEEE International Conference on Computational Science and Engineering(CSE 2009).IEEE Computer Society,2009:305-312

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!