Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition for securely outsourcing computations from a computationally limited device to an untrusted helper. In their paper, the adversarial environment writes the software for the helper, but then does not have direct communication with it once the device starts relying on it. In addition to security, they also provide a framework for quantifying the efficiency and check ability of an outsourcing implementation. They present two practical outsource secure schemes.

Provided by: International Journal of Communications and Engineering Topic: Security Date Added: Nov 2012 Format: PDF

Find By Topic