Introduction to secure outsourcing computation / Xiaofeng Chen.
Tipo de material:![Texto](/opac-tmpl/lib/famfamfam/BK.png)
- texto
- sin mediación
- volumen
- 9781627057912
- 9781627057929
- 1627057927
- QA 76.585 C44.2016
Tipo de ítem | Biblioteca actual | Colección | Signatura topográfica | Copia número | Estado | Fecha de vencimiento | Código de barras | |
---|---|---|---|---|---|---|---|---|
Libros | Biblioteca Francisco Xavier Clavigero Acervo | Acervo General | QA 76.585 C44.2016 (Navegar estantería(Abre debajo)) | ej. 1 | Disponible | UIA167417 |
Incluye referencias bibliográficas (páginas 67-78).
1. Introduction -- 1.1 Outsourcing paradigm in cloud computing -- 1.2 Secure challenges in outsourcing computation -- 1.3 Formal security definition -- 1.3.1 Security requirements -- 1.3.2 Adversarial model -- 1.4 General construction.
2. Preliminaries -- 2.1 Number-theoretic problems -- 2.2 Bilinear pairings (groups of prime order) -- 2.3 Bilinear pairings (groups of composite order) -- 2.4 Sparse matrix and dense matrix -- 2.5 Vector commitments -- 2.6 Algebraic pseudorandom functions -- 2.7 Bloom filter.
3. Secure outsourcing of scientific computations -- 3.1 Matrix multiplication -- 3.1.1 A basic solution -- 3.1.2 An enhanced solution -- 3.2 Matrix inversion -- 3.3 Large-scale linear equations systems -- 3.3.1 New secure outsourcing protocol -- 3.3.2 Security analysis.
4. Secure outsourcing of cryptographic operations -- 4.1 Security definitions -- 4.2 Two untrusted program model -- 4.3 Secure outsourcing of single modular exponentiation -- 4.3.1 The proposed algorithm -- 4.3.2 Security analysis -- 4.3.3 Comparison -- 4.4 Secure outsourcing of simultaneous modular exponentiation -- 4.4.1 Outsourcing algorithm -- 4.4.2 Efficiency -- 4.5 Secure outsourcing of bilinear pairings -- 4.5.1 Outsourcing algorithm -- 4.5.2 Improved outsourcing algorithm.
5. Secure outsourcing of large database with updates -- 5.1 Security definitions -- 5.1.1 Security requirements -- 5.1.2 Forward automatic/backward substitution update attack -- 5.2 VDB construction from delegating polynomial functions -- 5.2.1 Delegating of polynomial functions -- 5.2.2 Benabbas-Gennaro-Vahlis VDB construction -- 5.3 VDB framework based on vector commitment -- 5.3.1 The general framework -- 5.3.2 Security analysis -- 5.4 VDB framework from binding vector commitment -- 5.4.1 A concrete VDB scheme -- 5.4.2 Security analysis of the VDB scheme -- 5.5 Incremental VDB framework -- 5.5.1 Incremental encryption based on bit flipping -- 5.5.2 Inc-VDB framework -- 5.5.3 A concrete Inc-VDB scheme.
6. Conclusion and future works -- Bibliography -- Author's biography.