...
首页> 外文期刊>Concurrency, practice and experience >Verifiable Chebyshevmaps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios
【24h】

Verifiable Chebyshevmaps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios

机译:可验证的基于Chebyshevmaps的混沌加密方案,在云/雾场景中具有外包计算

获取原文
获取原文并翻译 | 示例
           

摘要

Based on cloud servers' powerful storage and computing resources, users can store mass encrypted data in the cloud and outsource complex encryption computations to the cloud servers. Since cloud servers cannot be completely trusted, then data privacy and integrity are concerned about hot issues.We focus on the following problems in outsourced encryptions: how to protect the data privacy and how to check the integrity of data and the correctness of cloud server's outsourcing computations. In this paper, we at first propose a verifiable chaotic encryption based on Chebyshev polynomials. The scheme supports verifiable function for data integrity. To further improve the efficiency of the scheme, a corresponding outsourced encryption scheme is constructed, where the heavy overhead evaluations of Chebyshev polynomials are transferred from the user side to the cloud server. The outsourced encryption also provides the checkability for data integrity and correctness of cloud computations. The scheme is suitable for mobile users with limited computing resources.Moreover, the newlyproposedschemenolongerdependsupon the simple heuristic analysis. It achieves the indistinguishability under chosen-ciphertext attacks (IND-CCA) in the standard model based on the Chebyshev-based Decisional Diffie-Hellman (CDDH)assumption. Thus,we answer a long-term open problem for building a chaotic encryption scheme with provable security in the sense of the IND-CCA.
机译:基于云服务器强大的存储和计算资源,用户可以将大量加密数据存储在云中,并将复杂的加密计算外包给云服务器。由于无法完全信任云服务器,因此数据隐私和完整性成为热点问题。我们关注外包加密中的以下问题:如何保护数据隐私以及如何检查数据的完整性以及云服务器外包的正确性计算。在本文中,我们首先提出一种基于Chebyshev多项式的可验证混沌加密方法。该方案支持可验证的数据完整性功能。为了进一步提高该方案的效率,构建了相应的外包加密方案,其中Chebyshev多项式的繁重开销评估从用户端转移到云服务器。外包加密还提供了数据完整性和云计算正确性的可检查性。该方案适用于计算资源有限的移动用户。此外,新提议的化学方法依赖于简单的启发式分析。在基于基于Chebyshev的决策Diffie-Hellman(CDDH)假设的标准模型中,它在选择密文攻击(IND-CCA)下实现了不可区分性。因此,我们从IND-CCA的意义上回答了建立具有可证明的安全性的混沌加密方案的长期开放问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号