Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

27.10.2015

Construction of Pseudoinverse Matrix Over Finite Field and Its Applications

verfasst von: Van H. Dang, Thuc D. Nguyen

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of smart devices like smart phones or tablets, etc., the challenging point for these devices is risen in the security problems required limited computational capacity, which attracts researchers in both academia and industrial societies. In this paper, we tackle two interesting security problems: changing a shared key between two users and privacy-preserving auditing for cloud storage. Our solution is a linear computational and one way method based on pseudoinverse matrix, a generalization concept of inverse matrix. In addition, this can be applied for devices with limited computational capacity due to its fast computation. Indeed, we conduct two experiments to show its efficiency in computation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
\(\alpha ,\beta ,\gamma ,\delta\) always exist due to the Lagrange’s Four Square Theorem.
 
Literatur
1.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., et al. (2011). Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 14(1), 12.CrossRef Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., et al. (2011). Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 14(1), 12.CrossRef
2.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security (pp. 598–609). ACM. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security (pp. 598–609). ACM.
3.
Zurück zum Zitat Ben-Israel, A., & Greville, T. N. (2003). Generalized inverses. New York: Springer.MATH Ben-Israel, A., & Greville, T. N. (2003). Generalized inverses. New York: Springer.MATH
4.
Zurück zum Zitat Juels, A., & Kaliski Jr. B. S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584–597). ACM. Juels, A., & Kaliski Jr. B. S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584–597). ACM.
5.
Zurück zum Zitat Massey, J. L. (1998). Orthogonal, antiorthogonal and self-orthogonal matrices and their codes. Communications and Coding, 2, 3. Massey, J. L. (1998). Orthogonal, antiorthogonal and self-orthogonal matrices and their codes. Communications and Coding, 2, 3.
6.
Zurück zum Zitat Naor, M., & Rothblum, G. N. (2005). The complexity of online memory checking. In 46th annual IEEE symposium on foundations of computer science, 2005 (FOCS 2005) (pp. 573–582). IEEE. Naor, M., & Rothblum, G. N. (2005). The complexity of online memory checking. In 46th annual IEEE symposium on foundations of computer science, 2005 (FOCS 2005) (pp. 573–582). IEEE.
7.
Zurück zum Zitat Nguyen, T. D., & Dang, V. H. (2013). Quasi-inverse based cryptography. In Computational science and its applications—ICCSA 2013 (pp. 629–642). Springer. Nguyen, T. D., & Dang, V. H. (2013). Quasi-inverse based cryptography. In Computational science and its applications—ICCSA 2013 (pp. 629–642). Springer.
8.
Zurück zum Zitat Penrose, R. (1995). A generalized inverse for matrices. In Proceedings of the Cambridge Philosophy Society (Vol. 51, pp. 406–413). Cambridge University Press. Penrose, R. (1995). A generalized inverse for matrices. In Proceedings of the Cambridge Philosophy Society (Vol. 51, pp. 406–413). Cambridge University Press.
9.
Zurück zum Zitat Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Advances in cryptology—ASIACRYPT 2008 (pp. 90–107). Springer. Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Advances in cryptology—ASIACRYPT 2008 (pp. 90–107). Springer.
10.
Zurück zum Zitat Van, D. H., & Thuc, N. D. (2015). Pseudoinverse matrix over finite field and its applications. In K. J. Kim (Ed.), Information science and applications (pp. 491–498). Berlin: Springer. Van, D. H., & Thuc, N. D. (2015). Pseudoinverse matrix over finite field and its applications. In K. J. Kim (Ed.), Information science and applications (pp. 491–498). Berlin: Springer.
11.
Zurück zum Zitat Wang, C., Chow, S. S., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.MathSciNetCrossRef Wang, C., Chow, S. S., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.MathSciNetCrossRef
12.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE.
Metadaten
Titel
Construction of Pseudoinverse Matrix Over Finite Field and Its Applications
verfasst von
Van H. Dang
Thuc D. Nguyen
Publikationsdatum
27.10.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3095-6

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt