东北大学学报:自然科学版 ›› 2016, Vol. 37 ›› Issue (5): 619-623.DOI: 10.12068/j.issn.1005-3026.2016.05.003

• 信息与控制 • 上一篇    下一篇

基于双线性映射的公共可验证外包计算方案

李福祥1, 霍建秋2, 林慕清1, 周福才2   

  1. (1. 东北大学 计算机科学与工程学院, 辽宁 沈阳110819; 2. 东北大学 软件学院, 辽宁 沈阳110819)
  • 收稿日期:2015-03-11 修回日期:2015-03-11 出版日期:2016-05-15 发布日期:2016-05-13
  • 通讯作者: 李福祥
  • 作者简介:李福祥(1984-),男,辽宁沈阳人,东北大学博士研究生; 周福才(1964-),男,吉林长春人,东北大学教授,博士生导师.
  • 基金资助:
    国家自然科学基金资助项目(61300196);中央高校基本科研业务费专项资金(N130317003); 国家科学技术重大专项资助项目(2013ZX03002006); 辽宁省科技计划项目(2013217004); 沈阳自然科学基金资助项目(F14-231-1-08).

Bilinear Map-based Public Verifiable Outsourced Computation Scheme

LI Fu-xiang1, HUO Jian-qiu1, LIN Mu-qing1, ZHOU Fu-cai2   

  1. 1. School of Computer Science & Engineering, Northeastern University, Shenyang 110819, China; 2.School of Software, Northeastern University, Shenyang 110819, China.
  • Received:2015-03-11 Revised:2015-03-11 Online:2016-05-15 Published:2016-05-13
  • Contact: ZHOU Fu-cai
  • About author:-
  • Supported by:
    -

摘要: 已有可验证计算方案存在以下不足:一是只有计算委托方才可以对计算结果进行验证;二是即使计算委托方可以授权其他用户进行验证,但也需要将自身验证密钥交给授权用户.针对上述不足,提出一个支持公共验证的外包计算模型,给出其算法形式化定义及安全模型,并利用双线性映射提出了一个包含三方实体的公共可验证外包计算方案,给出了方案算法的具体描述、实体间的通信协议以及效率分析,方案验证无需私钥参与,实现了公共可验证性.在可证安全模型下证明该方案具有不可伪造性,其安全性可归约于l-SBDH问题的困难性.

关键词: 双线性映射, 公共可验证, 外包计算, 不可伪造性, 可验证计算

Abstract: There are two shortcomings for the existing verifiable computation schemes. One is that only the owner who outsourced the computation can verify the result, and the other is when the owner authorizes other users to verify the result, he has to send his secret key to all the authorized users. In order to overcome the problems, an outsourced computation model was proposed which supports the public verification. The description and security model were formalized and a publicly verifiable outsourced computation scheme, which is based on the bilinear map and contains three entities, was also presented. The algorithm implementation and the communication protocol were also described in details. The verification phase in the scheme does not need the owner’s secret key so it can be publicly verifiable. The scheme can be proved to satisfy unforgeability in the security model, and the security can be reduced to the hardness of the l-SBDH problem.

Key words: bilinear map, public verifiable, outsourced computation, unforgeability, verifiable computation

中图分类号: