Cloud outsourcing secret sharing scheme against covert adversaries
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just nee...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539538194792448 |
---|---|
author | En ZHANG Kui GENG Wei JIN Yong-jun LI Yun-qing SUN Feng-hua LI |
author_facet | En ZHANG Kui GENG Wei JIN Yong-jun LI Yun-qing SUN Feng-hua LI |
author_sort | En ZHANG |
collection | DOAJ |
description | In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective. |
format | Article |
id | doaj-art-cfe033bba51448d780cdeeafffd35170 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-cfe033bba51448d780cdeeafffd351702025-01-14T07:12:21ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-05-0138576559710206Cloud outsourcing secret sharing scheme against covert adversariesEn ZHANGKui GENGWei JINYong-jun LIYun-qing SUNFeng-hua LIIn order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/secret sharingoutsourcing computationcovert adversariesfairness |
spellingShingle | En ZHANG Kui GENG Wei JIN Yong-jun LI Yun-qing SUN Feng-hua LI Cloud outsourcing secret sharing scheme against covert adversaries Tongxin xuebao secret sharing outsourcing computation covert adversaries fairness |
title | Cloud outsourcing secret sharing scheme against covert adversaries |
title_full | Cloud outsourcing secret sharing scheme against covert adversaries |
title_fullStr | Cloud outsourcing secret sharing scheme against covert adversaries |
title_full_unstemmed | Cloud outsourcing secret sharing scheme against covert adversaries |
title_short | Cloud outsourcing secret sharing scheme against covert adversaries |
title_sort | cloud outsourcing secret sharing scheme against covert adversaries |
topic | secret sharing outsourcing computation covert adversaries fairness |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/ |
work_keys_str_mv | AT enzhang cloudoutsourcingsecretsharingschemeagainstcovertadversaries AT kuigeng cloudoutsourcingsecretsharingschemeagainstcovertadversaries AT weijin cloudoutsourcingsecretsharingschemeagainstcovertadversaries AT yongjunli cloudoutsourcingsecretsharingschemeagainstcovertadversaries AT yunqingsun cloudoutsourcingsecretsharingschemeagainstcovertadversaries AT fenghuali cloudoutsourcingsecretsharingschemeagainstcovertadversaries |