Security outsourcing method for bilinear pairings under cloud computing environment

A cloud computing environment, bilinear pairing technology, applied in the field of cloud computing, can solve problems such as high cost, high cost, impossible, meaningless, etc.

Active Publication Date: 2013-04-03
XIDIAN UNIV
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, an obvious disadvantage of this method is that the outsourcer needs to perform some other expensive calculations, such as scalar multiplication and exponentiation
More precisely, on the one hand, we consider these costly computations to be too resource-intensive to be performed on devices with limited computing power.
On the other hand, the cost of calculating scalar multiplication is equivalent to that of calculating pairs of operations in some scenarios, which is contradictory to the motivation and purpose of outsourcing calculations
Therefore, in this sense, the method is completely meaningless in real world applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security outsourcing method for bilinear pairings under cloud computing environment
  • Security outsourcing method for bilinear pairings under cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] figure 1 The method for outsourcing security of bilinear pairing under the cloud computing environment provided by the implementation of the present invention is shown, and the method includes:

[0048] T: Users who need to do outsourcing calculations;

[0049] U: server;

[0050] u 1 (A 1 , A 2 )→e(A 1 , A 2 ): Server U i (i is 1 or 2) with A 1 , A 2 Run Pair as input, and output the bilinear pairing operation result e(A 1 , A 2 ).

[0051] PA: G 1 or G 2 The last point-to-point addition operation;

[0052] SM: G 1 or G 2 A scalar multiplication operation on ;

[0053] M:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security outsourcing method for bilinear pairings under a cloud computing environment. A user T needing to perform outsourcing computing first calls a subroutine Rand for improving computing speed to generate a six-tuple, a number of elements in the six-tuple are utilized to divide e(A, B) logic into five parts, then Rand is called to generate two new six-tuples, inquiry is performed on computing servers U1 and U2 for eight times, the servers work out bilinear pairing results, four parts of the bilinear pairing results serve as intermediate computing results, and the other four parts of the bilinear pairing results serve as test data. Finally the T detects whether output results of the U1 and the U2 are correct and works out results according to response of the servers. The method is suitable for resource-constrained devices. The security outsourcing method is high in computing efficiency, operational times is little, and a subcontractor T does not need to carry out SM and Exp operation high in cost any longer. In addition, by utilizing the method to serve as a subroutine, an encryption scheme of Boneh-Franklin based on identity and security outsourcing of a signature scheme of Cha-Cheon based on identity can be achieved.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a method for secure outsourcing of bilinear pairs in a cloud computing environment. Background technique [0002] With the rapid development of cloud services in terms of availability, how to outsource the costly computing security to untrusted servers has attracted more and more attention from the scientific community. In the outsourced computing mode, for resource-constrained devices, it can enjoy unlimited computing resources on a pay-per-use basis, which can greatly save capital expenditures on hardware / software deployment and maintenance. [0003] Although outsourcing computing brings great benefits, it inevitably introduces some new security issues and challenges. First, computing tasks usually contain some sensitive information, which should not be exposed to untrusted cloud servers. Thus, the first security challenge is confidential outsourced comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
Inventor 陈晓峰王星尤沛李进朱辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products