A secure delegation scheme of large polynomial computation in multi-party cloud

被引:0
|
作者
Guo, Shu [1 ]
Xu, Haixia [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
secret sharing; cloud; delegating computation; unchanged threshold;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming widely used both in academia and industry and one of the most important applications is delegating computation. A computationally weak client delegates tasks to one or more workers in cloud, and this is called delegation computation. Delegation computation has high security requirements, and it needs to ensure that the information of the client would not be leaked and the computation will be computed correctly. What's more, the clients can verify the result after computation. This paper presents a delegation protocol and it allows the client to delegate a large polynomial to more than one worker while keeping privacy and correctness. In this paper, the workers make computations directly on the shares from the client, and keep the threshold unchanged. This protocol has these advantages: the protocol keeps privacy of the original input; the workers have no interaction with each other during the execution; the protocol keeps the threshold unchanged.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [21] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [22] Generic server-aided secure multi-party computation in cloud computing
    Wu, Yulin
    Wang, Xuan
    Susilo, Willy
    Yang, Guomin
    Jiang, Zoe L.
    Yiu, Siu-Ming
    Wang, Hao
    COMPUTER STANDARDS & INTERFACES, 2022, 79
  • [23] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [24] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287
  • [25] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
  • [26] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [27] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
  • [28] Secure Multi-party Computation and Its Applications
    Veugen, Thijs
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 3 - 5
  • [29] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [30] A Lightweight CP-ABE Scheme for EHR Over Cloud Based on Blockchain and Secure Multi-Party Computation
    Qiao, Jiawen
    Wang, Na
    Fu, Junsong
    Deng, Lunzhi
    Wang, Jingjing
    Liu, Jianwei
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (02):