Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security outsourcing method for two bilinear pairings based on dual cloud servers

A bilinear pairing and secure outsourcing technology, applied in the field of cloud computing, can solve the problems of high computing cost, high estimated complexity, and unsatisfactory computing efficiency.

Active Publication Date: 2017-10-13
SHANGHAI UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Subsequently, Jiang Tiejin and others released a cloud outsourcing computing method based on a single server, but the estimated complexity is too high and the computing cost is too high
Chen Xiaofeng et al. and Tian Haibo et al. released a cloud outsourcing computing method based on two servers, which improves computing efficiency. However, in actual outsourcing scenarios, many cases involve multiple bilinear pairing operations. However, the above The methods mentioned are all for the safe outsourcing operation of a single bilinear pair, the calculation efficiency is not ideal, and the calculation cost is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security outsourcing method for two bilinear pairings based on dual cloud servers
  • Security outsourcing method for two bilinear pairings based on dual cloud servers
  • Security outsourcing method for two bilinear pairings based on dual cloud servers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Preferred embodiments of the present invention are described in detail as follows:

[0050] In this example, see figure 1 , a security outsourcing method for two bilinear pairings based on two servers, comprising the following steps:

[0051] Step 1: The outsourced user T calls the program Rand to generate a six-tuple, where Rand is a subroutine used to improve the calculation speed, and is used to pass the server U 1 with U 2 To realize the outsourced method M-Pair of bilinear pairing, specifically: the outsourced user T first needs to call the program Rand, input G 1 , G 2 , a bilinear pairing and other random numbers, generate and output a six-tuple {V 1 , V 2 , v 1 V 1 , v 2 V 2 , e(v 1 V 1 , v 2 V 2 )}, {V 1 , V 2 , v 1 V 1 , v 2 V 2 , e(v 1 V 1 , v 2 V 2 )} results can be pre-calculated, where v 1 , V 1 ∈RG 1 , V 2 ∈RG 2 , is a random number in the remainder class modulo q with zero elements removed, RG 1 is G 1 A random point in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security outsourcing method for two bilinear pairings based on dual cloud servers. First, a user T performing outsourcing computation calls a subroutine Rand for improving the computing speed to generate a six-tuple, and elements in the six-tuple are utilized to divide e(A, B)*e(C, D) logic into four parts. Then, Rand is called to generate two new six-tuples, computing servers U1 and U2 are inquired four times respectively, the servers work out bilinear pairing results, four parts of the bilinear pairing results serve as intermediate computing results, and the other four parts of the bilinear pairing results serve as test data. Finally, whether output results of U1 and the U2 are correct is detected, and results are worked out according to the response of the servers. The security outsourcing method is suitable for resource-constrained devices. The security outsourcing method has the advantages of high computing efficiency and fewer operations. Outsourcers do not need to carry out high-cost SM and Exp operation any longer. Moreover, the security outsourcing method of the invention is applicable to an outsourcing computation scene of multiple bilinear pairings, and is of higher practical application value.

Description

technical field [0001] The invention relates to an outsourcing computing method, in particular to a method for using a cloud server to safely outsource bilinear pairings, which is applied in the technical field of cloud computing. Background technique [0002] Cloud computing has attracted more and more attention in academia and industry, and how to outsource the costly computing security to untrusted servers has attracted more and more attention from the scientific community. In the outsourced computing model, a customer with limited computing power outsources tasks to one or more servers in the cloud, which is outsourced computing. For resource-constrained client devices, it can enjoy unlimited computing resources on a pay-per-use basis, which can greatly save capital expenditures on hardware / software deployment and maintenance. [0003] While outsourcing computing brings enormous benefits, it inevitably introduces some new security issues and challenges. First, computin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L29/08
CPCH04L9/3066H04L63/20H04L67/10
Inventor 毛震任艳丽张新鹏
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products