Cloud outsourcing secret sharing scheme against covert adversaries

In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just nee...

Full description

Bibliographic Details
Published in:Tongxin xuebao
Main Authors: En ZHANG, Kui GENG, Wei JIN, Yong-jun LI, Yun-qing SUN, Feng-hua LI
Format: Article
Language:Chinese
Published: Editorial Department of Journal on Communications 2017-05-01
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/
_version_ 1849878951559692288
author En ZHANG
Kui GENG
Wei JIN
Yong-jun LI
Yun-qing SUN
Feng-hua LI
author_facet En ZHANG
Kui GENG
Wei JIN
Yong-jun LI
Yun-qing SUN
Feng-hua LI
author_sort En ZHANG
collection DOAJ
container_title Tongxin xuebao
description In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.
format Article
id doaj-art-cfe033bba51448d780cdeeafffd35170
institution Directory of Open Access Journals
issn 1000-436X
language zho
publishDate 2017-05-01
publisher Editorial Department of Journal on Communications
record_format Article
spelling doaj-art-cfe033bba51448d780cdeeafffd351702025-08-20T01:10:33ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-05-0138576559710206Cloud outsourcing secret sharing scheme against covert adversariesEn ZHANGKui GENGWei JINYong-jun LIYun-qing SUNFeng-hua LIIn order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/secret sharingoutsourcing computationcovert adversariesfairness
spellingShingle En ZHANG
Kui GENG
Wei JIN
Yong-jun LI
Yun-qing SUN
Feng-hua LI
Cloud outsourcing secret sharing scheme against covert adversaries
secret sharing
outsourcing computation
covert adversaries
fairness
title Cloud outsourcing secret sharing scheme against covert adversaries
title_full Cloud outsourcing secret sharing scheme against covert adversaries
title_fullStr Cloud outsourcing secret sharing scheme against covert adversaries
title_full_unstemmed Cloud outsourcing secret sharing scheme against covert adversaries
title_short Cloud outsourcing secret sharing scheme against covert adversaries
title_sort cloud outsourcing secret sharing scheme against covert adversaries
topic secret sharing
outsourcing computation
covert adversaries
fairness
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/
work_keys_str_mv AT enzhang cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT kuigeng cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT weijin cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT yongjunli cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT yunqingsun cloudoutsourcingsecretsharingschemeagainstcovertadversaries
AT fenghuali cloudoutsourcingsecretsharingschemeagainstcovertadversaries