Journal on Communications ›› 2017, Vol. 38 ›› Issue (5): 57-65.doi: 10.11959/j.issn.1000-436x.2017100

• Papers • Previous Articles     Next Articles

Cloud outsourcing secret sharing scheme against covert adversaries

En ZHANG1,2,Kui GENG1,Wei JIN1,3,Yong-jun LI1,3,Yun-qing SUN4,Feng-hua LI1,3   

  1. 1 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100195,China
    2 College of Computer and Information Engineering,Henan Normal University,Xinxiang 453007,China
    3 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
    4 School of Telecommunications Engineering,Xidian University,Xi’an 710071,China
  • Revised:2017-03-21 Online:2017-05-01 Published:2017-05-28
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program)(2015AA016007);The National Natural Science Foundation of China(U1401251);The National Natural Science Foundation of China(U1604156);Innovative Practice Project of College Students in Chinese Academy of Sciences(1188005088);Science and Technology Research Project of Henan Province(172102210045)

Abstract:

In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.

Key words: secret sharing, outsourcing computation, covert adversaries, fairness

CLC Number: 

No Suggested Reading articles found!