检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:侯金秋 彭长根[2] 丁红发[3] 杨训 HOU Jinqiu;PENG Changgen;DING Hongfa;YANG Xun(College of Management Science and Engineering,Anhui University of Finance&Economics,Bengbu 233030,China;School of Computer Science and Technology,Guizhou University,Guiyang 550025,China;Key Laboratory of Blockchain and Fintech of Department of Education of Guizhou Province,Guizhou University of Finance and Economics,Guiyang 550025,China;Nonlinear Analysis and High-Performance Computing Laboratory,School of Science,Guizhou University of Engineering Science,Bijie 551700,China)
机构地区:[1]安徽财经大学管理科学与工程学院,安徽蚌埠233030 [2]贵州大学计算机科学与技术学院,贵州贵阳550025 [3]贵州财经大学贵州省高等学校区块链与金融科技重点实验室,贵州贵阳550025 [4]贵州工程应用技术学院理学院非线性分析与高性能计算实验室,贵州毕节551700
出 处:《通信学报》2025年第3期234-247,共14页Journal on Communications
基 金:国家自然科学基金资助项目(No.62272124);贵州省教育厅自然科学研究基金资助项目(No.[2023]065,No.[2023]064);安徽财经大学校级科研基金资助项目(No.ACKYB24016)。
摘 要:针对不可信云环境下传统全同态加密算法难以支持多用户密文共享及安全公平计算问题,提出了一种基于身份的可验证多用户同态代理重加密方案。首先,构建非合作博弈模型,提出动态资源分配算法,实现第三方云服务器的公平资源分配,确保资源使用的公平性与高效性。其次,通过代理重加密技术实现密文的转换,支持多用户同态运算,满足细粒度密文共享需求。最后,使用授权函数同态签名验证计算结果和云服务器行为,并在标准模型下给出所提方案的安全性证明。理论分析和实验结果表明,所提方案在保证重加密可验证性的同时,能够实现多用户同态运算。To address the challenges of multi-user ciphertext sharing and secure fair computation in untrusted cloud environments where traditional fully homomorphic encryption algorithms prove inadequate,a verifiable identity-based multiuser homomorphic proxy re-encryption scheme was proposed.Firstly,a non-cooperative game model was constructed,and a dynamic resource allocation algorithm was proposed to achieve fair resource distribution for third-party cloud servers,ensuring fairness and efficiency in resource utilization.Secondly,ciphertext conversion was implemented through proxy re-encryption technology to support multi-user homomorphic computation and meet fine-grained ciphertext sharing requirements.Finally,an authorized function-based homomorphic signature was employed to verify computation results and cloud server behaviors,with security proofs of the proposed scheme was provided under the standard model.Theoretical analysis and experimental results demonstrate that the proposed scheme exhibits re-encryption verifiability and enables multi-user homomorphic computation.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.149.237.146