计算机科学 ›› 2015, Vol. 42 ›› Issue (10): 159-159.

• 信息安全 • 上一篇    下一篇

基本初等函数的保密云计算服务协议

刘新,李顺东,陈振华   

  1. 陕西师范大学计算机科学学院 西安710062;内蒙古科技大学信息工程学院 包头014010,陕西师范大学计算机科学学院 西安710062,陕西师范大学计算机科学学院 西安710062
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金资助

Secure Cloud Computing Service Protocols of Elementary Functions

LIU Xin, LI Shun-dong and CHEN Zhen-hua   

  • Online:2018-11-14 Published:2018-11-14

摘要: 目前云计算已经成为解决很多问题的一个有力平台,同时也带来了大量的安全隐患。其中,关于基本初等函数的保密计算是所有云计算的基础和核心。 提出了所有基本初等函数的保密云计算服务协议,其基本思想是将原始数据做变换后,把计算复杂部分发给云平台,通过云计算将结果反馈给接受服务方,从而保密地计算相应函数。通过广泛接受的模拟范例证明了协议的安全性。协议中接受计算服务方可用很少的计算资源解决复杂的计算问题,保证了较低的计算复杂度和通信复杂度,因此提出的协议是有效可行的,可以成为云保密计算中的基础子协议。

关键词: 云计算,保密计算服务协议,基本初等函数,安全性

Abstract: Cloud computing has become a powerful platform to solve many problems,while it has brought a lot of secure troubles.Cloud computing of elementary functions is the foundation and core of all cloud computation.We presented secure cloud computing service protocols for elementary functions.After transforming primitive parameters into other forms,we sent the complex parts to the cloud platform to compute.Using the well-accepted simulation paradigm,we proved that the protocols are secure.In the protocols,the service receiver can solve complicated computation problems with less computation sources.The protocols have lower computation and communication overheads.Therefore,the protocols are effective and feasible,and can become the based subprotocols of cloud computing.

Key words: Cloud computing,Secure computation service protocols,Elementary functions,Security

[1] Sun Cloud Architecture Introduction White Paper[EB/OL].http://developers.sun.com.cn/blog/functionalca/resource/sun_353cloudcomputing_chinese.pdf
[2] Feigenbaum J,Can Y.Take advantage of someone without ha-ving to trust him [C]∥Advances in Cryptology Crypto 1985.Berlin:Springer Verlag,1986:477-488
[3] Cramer R,Damgard I.Multiparty Computations,an Introduction[M]∥Advanced Courses in Mathematics,2005:41-87
[4] Yao A C.Protocols for secure computations [C]∥Proceedings of the 23th IEEE Symposium on Foundations of Computer Scie-nce.Washington,DC:IEEE Press,1982:160-164
[5] Goldreich O,Micali S,Wigderson A.How to play any mental game [C]∥Proceedings of the Nineteenth Annual ACM Confe-rence on Theory of Computing.Piscataway:IEEE Press,1987:218-229
[6] Goldwasser S.Multiparty computations:Past and present [C]∥Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing.NY:ACM Press,1997:1-6
[7] Du W L,Atallah M J.Privacy-preserving cooperative scientific computations[C]∥Proc.of the 14th IEEE Computer Security Foundations Workshop.Nova Scotia,Canada,2001:273-282
[8] Du W L,Atallah M J.Privacy-preserving cooperative statistical analysis[C]∥17th Annual Computer Security Applications Conference.New Orleans,Louisiana,USA,2001:102-110
[9] Du W L.A study of several specific secure two-party computation problems[D].West Lafayette:Purdue University,2000
[10] Du W L,Atallah M J.Secure multiparty computation problems and their applications:A review and open problems[C]∥Proceedings of New Security Paradigms Workshop 2001.NY:ACM Press,2001:11-20
[11] 罗文俊,李祥.双向零知识证明与初等函数两方保密计算[J].贵州大学学报(自然科学版),2004,21(1):36-42 Luo Wen-jun,Li Xiang.Two-directional Zero-Knowledge Proof and Secure Two-Party Computation[J].Journal of Guizhou University(Natural Science),2004,21(1):36-42
[12] 罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235 Luo Wen-Jun,Li Xiang.The secure multi-party protocol of matrix product and its application[J].Chinese Journal of Compu-ters,2005,28(7):1230-1235
[13] 肖倩,罗守山,陈萍,等.半诚实模型下安全多方排序问题的研究[J].电子学报,2008,34(4):709-714 Xiao Qian,Luo Shou-shan,Chen Ping,et al.Research on the Problem of Secure Multi-party Ranking Under Semi-honest Model[J].Acta Electronica Sinica,2008,34(4):709-714
[14] Goldreich O.The Fundamental of Cryptography:Basic Applications [M].London:Cambridge University Press,2004
[15] 李顺东.3个保密计算服务协议[J].陕西师范大学学报,2010,38(4):1-6 Li Shun-dong.Three specific secure computation service protocols[J].Journal of Shaanxi Normal University,2010,38(4):1-6
[16] Diffie W,Hellman M E.New direction in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):29-40
[17] 李顺东,王道顺.现代密码学:理论、方法与研究前沿[M].北京:科学出版社,2009 Li Shun-dong,Wang Dao-shun.Modern Cryptography:Theory,Method,Research Fronts[M].Beijing:Science Press,2009
[18] Rabaey J,Ammer J,Da Silva Jr J L.Pieo Radio:Ad-hoc wireless networking of ubiquitous low-energy sensor and monitor nodes[C]∥Proceedings of IEEE Computer Society Workshop on VLSI.April 2000:9-12
[19] William P,Brian F,Saul T,et al.LU Decomposition and its applications[M]∥2nd Numerical Recipes in Fortran:The Art of Scientific Computing.Cambridge:University Press,1992
[20] Lin H Y,Tzeng W G.An efficient solution to the millionaires problem based on homomorphic encryption [C]∥Proceedings of Applied Cryptography and Network Security 2005(LNCS3531).NY:Springer,2005:456-466
[21] 李顺东,戴一奇,尤启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):770-773 Li Shun-dong,Dai Yi-qi,You Qi-you.An Efficient Solution to Yao’s Millionaires Problem[J].Acta Electronica Sinica,2005,3(5):770-773
[22] Li S D,Wang D S,Dai Y Q,et al.Symmetric cryptographic solution to yao’s millionaires problem and an evaluation of secure multiparty computations [J].Information Sciences,2008,178(2):244-255
[23] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803 Li Shun-dong,Wang Dao-shun.Efficient Secure Multiparty Computation Based on Homomorphic Encryption[J].Acta Electronica Sinica,2013,41(4):798-803
[24] Malek B,Miri A.Combining attribute-based and access systems[C]∥Proc.of 12th IEEE International Conference on Computational Science and Engineering(CSE 2009).IEEE Computer Society,2009:305-312

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!