z-logo
Premium
Verifiable Chebyshev maps‐based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios
Author(s) -
Li Jing,
Wang Licheng,
Wang Lihua,
Wang Xianmin,
Huang Zhengan,
Li Jin
Publication year - 2018
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.4523
Subject(s) - encryption , cloud computing , computer science , correctness , outsourcing , server , verifiable secret sharing , client side encryption , theoretical computer science , computer security , distributed computing , computer network , algorithm , on the fly encryption , operating system , set (abstract data type) , programming language , political science , law
Summary Based on cloud servers' powerful storage and computing resources, users can store mass encrypted data in the cloud and outsource complex encryption computations to the cloud servers. Since cloud servers cannot be completely trusted, then data privacy and integrity are concerned about hot issues. We focus on the following problems in outsourced encryptions: how to protect the data privacy and how to check the integrity of data and the correctness of cloud server's outsourcing computations. In this paper, we at first propose a verifiable chaotic encryption based on Chebyshev polynomials. The scheme supports verifiable function for data integrity. To further improve the efficiency of the scheme, a corresponding outsourced encryption scheme is constructed, where the heavy overhead evaluations of Chebyshev polynomials are transferred from the user side to the cloud server. The outsourced encryption also provides the checkability for data integrity and correctness of cloud computations. The scheme is suitable for mobile users with limited computing resources. Moreover, the newly proposed scheme no longer depends upon the simple heuristic analysis. It achieves the indistinguishability under chosen‐ciphertext attacks (IND‐CCA) in the standard model based on the Chebyshev‐based Decisional Diffie‐Hellman (CDDH) assumption. Thus, we answer a long‐term open problem for building a chaotic encryption scheme with provable security in the sense of the IND‐CCA.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here