网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (11): 52-60.doi: 10.11959/j.issn.2096-109x.2016.00109

• 学术论文 • 上一篇    下一篇

安全可验证的行列式云外包计算及其电子交易方案

孙瑞1,2,田有亮2,3   

  1. 1 贵州大学数学与统计学院,贵州 贵阳 550025
    2 贵州省公共大数据重点实验室,贵州 贵阳 550025
    3 贵州大学计算机科学与技术学院,贵州 贵阳 550025
  • 修回日期:2016-10-23 出版日期:2016-11-01 发布日期:2016-11-15
  • 作者简介:孙瑞(1993-),女,新疆乌鲁木齐人,贵州大学硕士生,主要研究方向为密码学理论与工程。|田有亮(1982-),男,贵州六盘水人,博士,贵州大学教授、硕士生导师,主要研究方向为算法博弈论、密码学与安全协议。
  • 基金资助:
    国家自然科学基金资助项目(61363068);贵州大学博士基金资助项目(2012-024);贵州省教育厅科技拔尖人才支持基金资助项目(黔教合KY字[2016]060);贵州省教育厅科技拔尖人才支持基金资助项目(Qian Education Combined KY word[2016]06)

Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme

Rui SUN1,2,You-Liang TIAN2,3   

  1. 1 College of Mathematics and Statistics,Guizhou University,Guiyang 550025,China
    2 Guizhou Provincial Key Laboratory of Public Big Data,Guiyang 550025,China
    3 College of Computer Science and Technology,Guizhou University,Guiyang 550025,China
  • Revised:2016-10-23 Online:2016-11-01 Published:2016-11-15
  • Supported by:
    The National Natural Science Foundation of China(61363068);Doctoral Fund Project in Guizhou University(2012-024);Science and Technology Top-notch Talent Support Project in Guizhou Province Department of Education(黔教合KY字[2016]060);Science and Technology Top-notch Talent Support Project in Guizhou Province Department of Education(Qian Education Combined KY word[2016]06)

摘要:

针对现有的云外包计算协议中服务端可能存在的用户信息被泄露、篡改等问题,提出了一个云环境下的安全、高效、可验证的矩阵行列式外包计算协议。首先,基于矩阵模糊技术构造云外包计算协议,它能够在不需要任何困难性假设的前提下保证用户信息的安全性;其次,通过构造一类特殊的变换矩阵对明文矩阵进行处理,使用户在收到返还结果后,能有效验证所反馈的计算结果是否被篡改,性能分析表明,此协议可以有效提高云外包计算的效率;最后,给出一个行列式外包计算的电子交易框架,能够有效应用于电子商务等领域。

关键词: 云外包计算, 行列式计算, 可验证性

Abstract:

In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computing protocol was based on the fuzz matrix technology and needed not under the premise of any difficulty assumptions to ensure the security of users’ informations.Secondly,by means of generating a special kind of transformation matrixes to deal with plaintext matrix,then after the users receive the returned results,the correctness of these results can be verified effectively,and the performance analysis shows this protocol can effectively improve the efficiency of outsourcing cloud computing.Finally,an electronic trading framework for determinant outsourcing computing was proposed,which could be effectively applied to e-commerce and other fields.

Key words: outsourcing cloud computing, determinant calculation, verifiability

中图分类号: 

No Suggested Reading articles found!