计算机应用 ›› 2018, Vol. 38 ›› Issue (2): 321-326.DOI: 10.11772/j.issn.1001-9081.2017082169

• 网络空间安全 • 上一篇    下一篇

基于双服务器模型的可公开验证多元多项式外包计算方案

罗小双1,2, 杨晓元1,2, 李聪1,2, 王绪安1,2   

  1. 1. 武警工程大学 密码工程学院, 西安 710086;
    2. 网络与信息安全武警部队重点实验室, 西安 710086
  • 收稿日期:2017-08-21 修回日期:2017-09-13 出版日期:2018-02-10 发布日期:2018-02-10
  • 通讯作者: 杨晓元
  • 作者简介:罗小双(1992-),男,陕西安康人,硕士,CCF会员,主要研究方向:信息安全、密码学;杨晓元(1959-),男,湖南湘潭人,教授,博士生导师,硕士,主要研究方向:信息安全、密码学;李聪(1990-),男,山东济宁人,硕士研究生,主要研究方向:公钥密码学;王绪安(1981-),男,湖北公安人,副教授,博士,主要研究方向:信息安全、密码学。
  • 基金资助:
    国家自然科学基金资助项目(U1636114,61572521);国家密码发展基金资助项目(MMJJ20170112);国家重点研发计划项目(2017YFB0802002);陕西省自然科学基金资助项目(2016JQ6037)。

Publicly verifiable outsourced computation scheme for multivariate polynomial based on two-server model

LUO Xiaoshuang1,2, YANG Xiaoyuan1,2, LI Cong1,2, WANG Xu'an1,2   

  1. 1. Engineering College of the Cryptography, Engineering University of the Armed Police Force, Xi'an Shaanxi 710086, China;
    2. Key Laboratory of Network & Information Security under the Chinese Armed Police Force, Xi'an Shaanxi 710086, China
  • Received:2017-08-21 Revised:2017-09-13 Online:2018-02-10 Published:2018-02-10
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (U1636114, 61572521), the National Code Development Program of China (MMJJ20170112), the National Key Research and Development Program of China (2017YFB0802002), the Natural Science Foundation of Shaanxi Province (2016JQ6037).

摘要: 结合云安全外包计算中的隐私保护问题,针对任意多元多项式函数的外包计算,利用同态加密算法和多线性映射,构造了基于双服务器模型的可公开验证外包计算方案。该方案能够保证多项式函数输入与输出的隐私性和安全性,用户或者任意第三方都可以对云服务器计算的结果进行验证,实现了可公开验证性和可用性。云返回给用户的结果处于密文状态,只有拥有解密密钥的用户才能够输出最终的结果,一定程度上保证了计算结果的安全性。分析结果表明,该方案在标准模型下能够达到输入的选择明文攻击(CPA)安全,用户的计算代价远远小于服务器以及直接计算多项式函数的计算代价。

关键词: 外包计算, 多元多项式, 同态加密, 多线性映射

Abstract: Combining with the privacy-preserving problem of secure outsourced computation in the cloud and aiming at arbitrary outsourcing multivariate polynomials, a publicly verifiable outsourced computation scheme based on two-server model was constructed by homomorphic encryption and multilinear mapping. The scheme can guarantee the privacy and security of inputs and outputs of polynomial functions, and reach the goal that users or any third party can verify the correctness of the results, thus achieving open verification and availability. The results returned by the cloud are in the state of encryption, only users who have decryption key can output the final results, which can ensure the security of computation. Besides, the scheme can achieve Chosen Plaintext Attack (CPA) security of inputs in the standard model, and the user's computational cost is much less than that of the server and direct computation.

Key words: outsourced computation, multivariate polynomial, homomorphic encryption, multilinear mapping

中图分类号: