首页 | 本学科首页   官方微博 | 高级检索  
     


Cloud outsourcing secret sharing scheme against covert adversaries
Authors:En ZHANG  Kui GENG  Wei JIN  Yong-jun LI  Yun-qing SUN  Feng-hua LI
Affiliation:1. State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100195,China;2. College of Computer and Information Engineering,Henan Normal University,Xinxiang 453007,China;3. School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China;4. School of Telecommunications Engineering,Xidian University,Xi’an 710071,China
Abstract:In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.
Keywords:secret sharing  outsourcing computation  covert adversaries  fairness  
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号