Font Size: a A A

Research On A Linearly Homomorphic Authenticated Encryption Scheme And Its Application

Posted on:2016-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:Q MengFull Text:PDF
GTID:2308330461486274Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
As an efficient and low-cost IT service, cloud computing has tremendous momentum in recent years. Cloud computing is a pay-per-use model for en-abling available, convenient network access to a share pool of computing re-sourses that can be rapidly offered and released with minimal management effort. Now cloud computing become an important role of IT construction in both companies and nations.The natural application in cloud computing is the increasingly relevant scenario where a user hope to store his (encrypted) data on the cloud such that he can later delegate the cloud to perform computation on his data and then return the computation result. As the cloud is untrusted, users should encrypt the data before sending to the cloud. But after computation, it is difficult for users to verify the correctness of the computation in an efficient way. It is necessary to ensure both privacy and correctness in cloud comput-ing. Data integrity verification and homomorphic encryption scheme are classic technology in cryptography. Since homomorphic encryption can preserve ho-momorphic structure of user’s plaintext while computing the encrypted data, it is important to study an integrity verification scheme with homomorphism corresponding to the delegate computing in cloud.In this paper,we discuss the the notion of linearly homomorphic authen-ticated encryption with public verifiability(LAEPuV). First, we introduce the basic concept of LAEPuV and its security notion, then indicate the security. Second, we construct a new LAEPuV to support probabilistic encryption. At last, using LAEPuV s technique, we improve the commitment scheme sup-port Paillier cryptosystem. By outsourcing the homomorphic computing, we reduce the committer’s cost, then we show its correctness and security.
Keywords/Search Tags:Authenticated encryption, Linear homomorphic signature, Cloud computing
PDF Full Text Request
Related items