Construction of Pseudoinverse Matrix Over Finite Field and Its Applications

被引:4
|
作者
Dang, Van H. [1 ]
Nguyen, Thuc D. [1 ]
机构
[1] Univ Sci, VNU HCM, Fac Informat Technol, Ho Chi Minh City, Vietnam
关键词
Pseudoinverse; Finite field; Data audit; Shared key;
D O I
10.1007/s11277-015-3095-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of smart devices like smart phones or tablets, etc., the challenging point for these devices is risen in the security problems required limited computational capacity, which attracts researchers in both academia and industrial societies. In this paper, we tackle two interesting security problems: changing a shared key between two users and privacy-preserving auditing for cloud storage. Our solution is a linear computational and one way method based on pseudoinverse matrix, a generalization concept of inverse matrix. In addition, this can be applied for devices with limited computational capacity due to its fast computation. Indeed, we conduct two experiments to show its efficiency in computation.
引用
收藏
页码:455 / 466
页数:12
相关论文
共 50 条