A secure delegation scheme of large polynomial computation in multi-party cloud

被引:0
|
作者
Guo, Shu [1 ]
Xu, Haixia [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
secret sharing; cloud; delegating computation; unchanged threshold;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming widely used both in academia and industry and one of the most important applications is delegating computation. A computationally weak client delegates tasks to one or more workers in cloud, and this is called delegation computation. Delegation computation has high security requirements, and it needs to ensure that the information of the client would not be leaked and the computation will be computed correctly. What's more, the clients can verify the result after computation. This paper presents a delegation protocol and it allows the client to delegate a large polynomial to more than one worker while keeping privacy and correctness. In this paper, the workers make computations directly on the shares from the client, and keep the threshold unchanged. This protocol has these advantages: the protocol keeps privacy of the original input; the workers have no interaction with each other during the execution; the protocol keeps the threshold unchanged.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [1] A secure delegation scheme of large polynomial computation in multi-party cloud
    Institute of Information Engineering, Chinese Academy of Science, Beijing, China
    Int. J. Grid Util. Comput., 1 (1-7):
  • [2] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [3] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [4] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [5] A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation
    Liu W.
    Guan Y.
    Huo J.
    Ding Y.
    Guo H.
    Li B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (05): : 1218 - 1229
  • [6] An Electronic Voting Scheme Based On Secure Multi-Party Computation
    Gang, Cao
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 292 - 294
  • [7] Privacy preserving multi-party computation delegation for deep learning in cloud computing
    Ma, Xu
    Zhang, Fangguo
    Chen, Xiaofeng
    Shen, Jian
    INFORMATION SCIENCES, 2018, 459 : 103 - 116
  • [8] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [9] Applying Secure Multi-Party Computation to Improve Collaboration in Healthcare Cloud
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    PROCEEDINGS OF 2016 THIRD INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION (SYSCO), 2016, : P6 - P11
  • [10] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation
    Mou, Wenhao
    Fu, Chunlei
    Lei, Yan
    Hu, Chunqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209