Imagen de Google Jackets
Vista normal Vista MARC

Introduction to secure outsourcing computation / Xiaofeng Chen.

Por: Tipo de material: TextoTextoSeries Synthesis lectures on information security, privacy and trust ; # 17.Editor: San Rafael, California : Morgan & Claypool Publishers, 2016Fecha de copyright: ©2016Descripción: xiii, 79 páginas : ilustraciones ; 24 cmTipo de contenido:
  • texto
Tipo de medio:
  • sin mediación
Tipo de soporte:
  • volumen
ISBN:
  • 9781627057912
  • 9781627057929
  • 1627057927
Tema(s): Clasificación LoC:
  • QA 76.585 C44.2016
Contenidos:
1. Introduction -- 1.1 Outsourcing paradigm in cloud computing -- 1.2 Secure challenges in outsourcing computation -- 1.3 Formal security definition -- 1.3.1 Security requirements -- 1.3.2 Adversarial model -- 1.4 General construction.
2. Preliminaries -- 2.1 Number-theoretic problems -- 2.2 Bilinear pairings (groups of prime order) -- 2.3 Bilinear pairings (groups of composite order) -- 2.4 Sparse matrix and dense matrix -- 2.5 Vector commitments -- 2.6 Algebraic pseudorandom functions -- 2.7 Bloom filter.
3. Secure outsourcing of scientific computations -- 3.1 Matrix multiplication -- 3.1.1 A basic solution -- 3.1.2 An enhanced solution -- 3.2 Matrix inversion -- 3.3 Large-scale linear equations systems -- 3.3.1 New secure outsourcing protocol -- 3.3.2 Security analysis.
4. Secure outsourcing of cryptographic operations -- 4.1 Security definitions -- 4.2 Two untrusted program model -- 4.3 Secure outsourcing of single modular exponentiation -- 4.3.1 The proposed algorithm -- 4.3.2 Security analysis -- 4.3.3 Comparison -- 4.4 Secure outsourcing of simultaneous modular exponentiation -- 4.4.1 Outsourcing algorithm -- 4.4.2 Efficiency -- 4.5 Secure outsourcing of bilinear pairings -- 4.5.1 Outsourcing algorithm -- 4.5.2 Improved outsourcing algorithm.
5. Secure outsourcing of large database with updates -- 5.1 Security definitions -- 5.1.1 Security requirements -- 5.1.2 Forward automatic/backward substitution update attack -- 5.2 VDB construction from delegating polynomial functions -- 5.2.1 Delegating of polynomial functions -- 5.2.2 Benabbas-Gennaro-Vahlis VDB construction -- 5.3 VDB framework based on vector commitment -- 5.3.1 The general framework -- 5.3.2 Security analysis -- 5.4 VDB framework from binding vector commitment -- 5.4.1 A concrete VDB scheme -- 5.4.2 Security analysis of the VDB scheme -- 5.5 Incremental VDB framework -- 5.5.1 Incremental encryption based on bit flipping -- 5.5.2 Inc-VDB framework -- 5.5.3 A concrete Inc-VDB scheme.
6. Conclusion and future works -- Bibliography -- Author's biography.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura topográfica Copia número Estado Fecha de vencimiento Código de barras
Libros Biblioteca Francisco Xavier Clavigero Acervo Acervo General QA 76.585 C44.2016 (Navegar estantería(Abre debajo)) ej. 1 Disponible UIA167417

Incluye referencias bibliográficas (páginas 67-78).

1. Introduction -- 1.1 Outsourcing paradigm in cloud computing -- 1.2 Secure challenges in outsourcing computation -- 1.3 Formal security definition -- 1.3.1 Security requirements -- 1.3.2 Adversarial model -- 1.4 General construction.

2. Preliminaries -- 2.1 Number-theoretic problems -- 2.2 Bilinear pairings (groups of prime order) -- 2.3 Bilinear pairings (groups of composite order) -- 2.4 Sparse matrix and dense matrix -- 2.5 Vector commitments -- 2.6 Algebraic pseudorandom functions -- 2.7 Bloom filter.

3. Secure outsourcing of scientific computations -- 3.1 Matrix multiplication -- 3.1.1 A basic solution -- 3.1.2 An enhanced solution -- 3.2 Matrix inversion -- 3.3 Large-scale linear equations systems -- 3.3.1 New secure outsourcing protocol -- 3.3.2 Security analysis.

4. Secure outsourcing of cryptographic operations -- 4.1 Security definitions -- 4.2 Two untrusted program model -- 4.3 Secure outsourcing of single modular exponentiation -- 4.3.1 The proposed algorithm -- 4.3.2 Security analysis -- 4.3.3 Comparison -- 4.4 Secure outsourcing of simultaneous modular exponentiation -- 4.4.1 Outsourcing algorithm -- 4.4.2 Efficiency -- 4.5 Secure outsourcing of bilinear pairings -- 4.5.1 Outsourcing algorithm -- 4.5.2 Improved outsourcing algorithm.

5. Secure outsourcing of large database with updates -- 5.1 Security definitions -- 5.1.1 Security requirements -- 5.1.2 Forward automatic/backward substitution update attack -- 5.2 VDB construction from delegating polynomial functions -- 5.2.1 Delegating of polynomial functions -- 5.2.2 Benabbas-Gennaro-Vahlis VDB construction -- 5.3 VDB framework based on vector commitment -- 5.3.1 The general framework -- 5.3.2 Security analysis -- 5.4 VDB framework from binding vector commitment -- 5.4.1 A concrete VDB scheme -- 5.4.2 Security analysis of the VDB scheme -- 5.5 Incremental VDB framework -- 5.5.1 Incremental encryption based on bit flipping -- 5.5.2 Inc-VDB framework -- 5.5.3 A concrete Inc-VDB scheme.

6. Conclusion and future works -- Bibliography -- Author's biography.