• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于多项式的高效多源外包数据可验证计算方案。

An efficient polynomial-based verifiable computation scheme on multi-source outsourced data.

作者信息

Zhang Yiran, Geng Huizheng, Su Li, He Shen, Lu Li

机构信息

China Mobile Research Institute, Beijing, 100053, China.

出版信息

Sci Rep. 2024 Apr 12;14(1):8512. doi: 10.1038/s41598-024-53267-x.

DOI:10.1038/s41598-024-53267-x
PMID:38609409
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11014867/
Abstract

With the development of cloud computing, users are more inclined to outsource complex computing tasks to cloud servers with strong computing capacity, and the cloud returns the final calculation results. However, the cloud is not completely trustworthy, which may leak the data of user and even return incorrect calculations on purpose. Therefore, it is important to verify the results of computing tasks without revealing the privacy of the users. Among all the computing tasks, the polynomial calculation is widely used in information security, linear algebra, signal processing and other fields. Most existing polynomial-based verifiable computation schemes require that the input of the polynomial function must come from a single data source, which means that the data must be signed by a single user. However, the input of the polynomial may come from multiple users in the practical application. In order to solve this problem, the researchers have proposed some schemes for multi-source outsourced data, but these schemes have the common problem of low efficiency. To improve the efficiency, this paper proposes an efficient polynomial-based verifiable computation scheme on multi-source outsourced data. We optimize the polynomials using Horner's method to increase the speed of verification, in which the addition gate and the multiplication gate can be interleaved to represent the polynomial function. In order to adapt to this structure, we design the corresponding homomorphic verification tag, so that the input of the polynomial can come from multiple data sources. We prove the correctness and rationality of the scheme, and carry out numerical analysis and evaluation research to verify the efficiency of the scheme. The experimental indicate that data contributors can sign 1000 new data in merely 2 s, while the verification of a delegated polynomial function with a power of 100 requires only 18 ms. These results confirm that the proposed scheme is better than the existing scheme.

摘要

随着云计算的发展,用户更倾向于将复杂的计算任务外包给具有强大计算能力的云服务器,然后云服务器返回最终的计算结果。然而,云并非完全可信,它可能会泄露用户数据,甚至故意返回错误的计算结果。因此,在不泄露用户隐私的情况下验证计算任务的结果非常重要。在所有计算任务中,多项式计算在信息安全、线性代数、信号处理等领域有着广泛的应用。大多数现有的基于多项式的可验证计算方案要求多项式函数的输入必须来自单一数据源,这意味着数据必须由单个用户签名。然而,在实际应用中,多项式的输入可能来自多个用户。为了解决这个问题,研究人员提出了一些针对多源外包数据的方案,但这些方案都存在效率低下的共同问题。为了提高效率,本文提出了一种基于多源外包数据的高效多项式可验证计算方案。我们使用霍纳法则优化多项式以提高验证速度,其中加法门和乘法门可以交错排列来表示多项式函数。为了适应这种结构,我们设计了相应的同态验证标签,使得多项式的输入可以来自多个数据源。我们证明了该方案的正确性和合理性,并进行了数值分析和评估研究以验证该方案的效率。实验表明,数据贡献者仅需2秒就能签署1000条新数据,而验证幂次为(100)的委托多项式函数仅需(18)毫秒。这些结果证实了所提出的方案优于现有方案。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/1ead348e5a6e/41598_2024_53267_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/ce83a63e2b2e/41598_2024_53267_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/e7a7e3219ec7/41598_2024_53267_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/f99d9bd1a71a/41598_2024_53267_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/e1b149ad5e08/41598_2024_53267_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/94d72fef9c56/41598_2024_53267_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/1ead348e5a6e/41598_2024_53267_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/ce83a63e2b2e/41598_2024_53267_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/e7a7e3219ec7/41598_2024_53267_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/f99d9bd1a71a/41598_2024_53267_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/e1b149ad5e08/41598_2024_53267_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/94d72fef9c56/41598_2024_53267_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/be11/11014867/1ead348e5a6e/41598_2024_53267_Fig6_HTML.jpg

相似文献

1
An efficient polynomial-based verifiable computation scheme on multi-source outsourced data.一种基于多项式的高效多源外包数据可验证计算方案。
Sci Rep. 2024 Apr 12;14(1):8512. doi: 10.1038/s41598-024-53267-x.
2
RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing.RPVC:边缘计算中的可撤销公开可验证计算解决方案。
Sensors (Basel). 2022 May 25;22(11):4012. doi: 10.3390/s22114012.
3
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.一种雾计算-云计算环境下的安全可验证外包访问控制方案
Sensors (Basel). 2017 Jul 24;17(7):1695. doi: 10.3390/s17071695.
4
Analysis of an ABE Scheme with Verifiable Outsourced Decryption.具有可验证外包解密功能的ABE方案分析
Sensors (Basel). 2018 Jan 10;18(1):176. doi: 10.3390/s18010176.
5
IoT data security in outsourced databases: A survey of verifiable database.外包数据库中的物联网数据安全:可验证数据库综述
Heliyon. 2024 Mar 26;10(7):e28117. doi: 10.1016/j.heliyon.2024.e28117. eCollection 2024 Apr 15.
6
Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing.可验证的完全外包基于属性的签密系统,用于云计算中的物联网电子健康大数据。
Math Biosci Eng. 2019 Apr 22;16(5):3561-3594. doi: 10.3934/mbe.2019178.
7
EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy.EVOAC-HP:一种高效且可验证的带有隐藏策略的外包访问控制方案。
Sensors (Basel). 2023 Apr 28;23(9):4384. doi: 10.3390/s23094384.
8
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.一种用于移动云计算的安全轻量级细粒度数据共享方案。
Sensors (Basel). 2020 Aug 21;20(17):4720. doi: 10.3390/s20174720.
9
Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment.云计算环境下利用可搜索加密算法的多传感器网络跟踪研究
PeerJ Comput Sci. 2023 Jun 20;9:e1433. doi: 10.7717/peerj-cs.1433. eCollection 2023.
10
FRR: fair remote retrieval of outsourced private medical records in electronic health networks.FRR:电子健康网络中外包私人医疗记录的公平远程检索
J Biomed Inform. 2014 Aug;50:226-33. doi: 10.1016/j.jbi.2014.02.008. Epub 2014 Feb 18.