A secure delegation scheme of large polynomial computation in multi-party cloud

被引:0
|
作者
Guo, Shu [1 ]
Xu, Haixia [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
secret sharing; cloud; delegating computation; unchanged threshold;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming widely used both in academia and industry and one of the most important applications is delegating computation. A computationally weak client delegates tasks to one or more workers in cloud, and this is called delegation computation. Delegation computation has high security requirements, and it needs to ensure that the information of the client would not be leaked and the computation will be computed correctly. What's more, the clients can verify the result after computation. This paper presents a delegation protocol and it allows the client to delegate a large polynomial to more than one worker while keeping privacy and correctness. In this paper, the workers make computations directly on the shares from the client, and keep the threshold unchanged. This protocol has these advantages: the protocol keeps privacy of the original input; the workers have no interaction with each other during the execution; the protocol keeps the threshold unchanged.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [31] Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs
    Boyle, Elette
    Chung, Kai-Min
    Pass, Rafael
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 742 - 762
  • [32] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [33] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [34] Secure Keyless Multi-party Storage Scheme
    Lafourcade, Pascal
    Mallordy, Lola-Baie
    Olivier-Anclin, Charles
    Robert, Leo
    COMPUTER SECURITY-ESORICS 2024, PT III, 2024, 14984 : 279 - 298
  • [35] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS
    Kosolapov, Yu. V.
    BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
  • [36] Minimal Complete Primitives for Secure Multi-Party Computation
    Matthias Fitzi
    Juan A. Garay
    Ueli Maurer
    Rafail Ostrovsky
    Journal of Cryptology, 2005, 18 : 37 - 61
  • [37] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [38] Application of Secure Multi-party Computation in Linear Programming
    Fu Zu-feng
    Wang Hai-ying
    Wu Yong-wu
    2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248
  • [39] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    Quantum Information Processing, 2018, 17
  • [40] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    Science China Information Sciences, 2011, 54 : 1654 - 1662