Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A safe and efficient outsourcing calculation implementation method and system

An implementation method and efficient technology, applied in the field of information security

Inactive Publication Date: 2020-02-11
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Judging from the current research work, the main problem facing outsourcing computing for general functions is still the problem of efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safe and efficient outsourcing calculation implementation method and system
  • A safe and efficient outsourcing calculation implementation method and system
  • A safe and efficient outsourcing calculation implementation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.

[0036] The functional encryption scheme is a fine-grained encryption scheme. The decryptor can use the decryption key to obtain the function value corresponding to the plaintext, but does not know other information about the plaintext. This feature can be well applied in outsourced computing, because the client wants the server to complete the calculation, but does not want to leak the value of the outsourced data x.

[0037] Functional encryption means that the decryption party has the ciphertext C of the message x and the decryption key SK corresponding to the function f f , can only decrypt the function value f(x) of the message, but cannot know other information about x. The functional encryption algorithm is defined as follows:

[0038] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure and efficient outsourcing calculation implementation method and system. The method comprises the following steps: 1) a client generates two independent public and private key pairs by using a function encryption scheme; 2) the client separately sends private keys in the two public and private key pairs and a function related to an outsourcing calculation function to two servers; 3) the two servers separately generate decryption keys corresponding to the function and sends the results to the opposite party; 4) the client encrypts a message and a random number by using public keys in the two public and private key pairs, and separately sends ciphertext to the two servers; 5) the two servers separately decrypt the ciphertext by adopting decryption keys and return calculation results to the client; and 6) the client verifies the calculation results returned by the two servers, obtains a value of the outsourcing calculation function if the calculation results are successfully verified, and otherwise, performs refusal. By adoption of the secure and efficient outsourcing calculation implementation method and system provided by the invention, the overall efficiency of an outsourcing calculation protocol can be improved, the calculated amounts of the servers are reduced while the calculated amount of the client is reduced, and which server is a malicious server can be detected.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a design scheme of an outsourcing computing protocol, specifically a method and system for implementing a secure outsourcing computing based on a functional encryption scheme, which can ensure the safety and overall efficiency of protocol execution. Background technique [0002] With the development of cloud computing, outsourced computing has been more and more widely used. Outsourced computing means that customers with weak computing capabilities hand over their computing tasks to an external server to help them complete the calculation, and the server returns the calculation result to the customer after completing the calculation. The design of an outsourced computing protocol needs to meet three main characteristics: correctness, security, and efficiency. Correctness refers to the result obtained by the server honestly executing the protocol, which must be verifie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0825H04L9/0861H04L9/0869H04L9/30
Inventor 李佩丽徐海霞
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products