Cloud outsourcing secret sharing scheme against covert adversaries

In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just nee...

Full description

Saved in:
Bibliographic Details
Main Authors: En ZHANG, Kui GENG, Wei JIN, Yong-jun LI, Yun-qing SUN, Feng-hua LI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539538194792448
author En ZHANG
Kui GENG
Wei JIN
Yong-jun LI
Yun-qing SUN
Feng-hua LI
author_facet En ZHANG
Kui GENG
Wei JIN
Yong-jun LI
Yun-qing SUN
Feng-hua LI
author_sort En ZHANG
collection DOAJ
description In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.
format Article
id doaj-art-cfe033bba51448d780cdeeafffd35170
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-cfe033bba51448d780cdeeafffd351702025-01-14T07:12:21ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-05-0138576559710206Cloud outsourcing secret sharing scheme against covert adversariesEn ZHANGKui GENGWei JINYong-jun LIYun-qing SUNFeng-hua LIIn order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/secret sharingoutsourcing computationcovert adversariesfairness
spellingShingle En ZHANG
Kui GENG
Wei JIN
Yong-jun LI
Yun-qing SUN
Feng-hua LI
Cloud outsourcing secret sharing scheme against covert adversaries
Tongxin xuebao
secret sharing
outsourcing computation
covert adversaries
fairness
title Cloud outsourcing secret sharing scheme against covert adversaries
title_full Cloud outsourcing secret sharing scheme against covert adversaries
title_fullStr Cloud outsourcing secret sharing scheme against covert adversaries
title_full_unstemmed Cloud outsourcing secret sharing scheme against covert adversaries
title_short Cloud outsourcing secret sharing scheme against covert adversaries
title_sort cloud outsourcing secret sharing scheme against covert adversaries
topic secret sharing
outsourcing computation
covert adversaries
fairness
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/
work_keys_str_mv AT enzhang cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT kuigeng cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT weijin cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT yongjunli cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT yunqingsun cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT fenghuali cloudoutsourcingsecretsharingschemeagainstcovertadversaries