Skip to main content
Top
Published in: Wireless Personal Communications 3/2017

27-10-2015

Construction of Pseudoinverse Matrix Over Finite Field and Its Applications

Authors: Van H. Dang, Thuc D. Nguyen

Published in: Wireless Personal Communications | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the development of smart devices like smart phones or tablets, etc., the challenging point for these devices is risen in the security problems required limited computational capacity, which attracts researchers in both academia and industrial societies. In this paper, we tackle two interesting security problems: changing a shared key between two users and privacy-preserving auditing for cloud storage. Our solution is a linear computational and one way method based on pseudoinverse matrix, a generalization concept of inverse matrix. In addition, this can be applied for devices with limited computational capacity due to its fast computation. Indeed, we conduct two experiments to show its efficiency in computation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
\(\alpha ,\beta ,\gamma ,\delta\) always exist due to the Lagrange’s Four Square Theorem.
 
Literature
1.
go back to reference Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., et al. (2011). Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 14(1), 12.CrossRef Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., et al. (2011). Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 14(1), 12.CrossRef
2.
go back to reference Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security (pp. 598–609). ACM. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security (pp. 598–609). ACM.
3.
go back to reference Ben-Israel, A., & Greville, T. N. (2003). Generalized inverses. New York: Springer.MATH Ben-Israel, A., & Greville, T. N. (2003). Generalized inverses. New York: Springer.MATH
4.
go back to reference Juels, A., & Kaliski Jr. B. S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584–597). ACM. Juels, A., & Kaliski Jr. B. S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584–597). ACM.
5.
go back to reference Massey, J. L. (1998). Orthogonal, antiorthogonal and self-orthogonal matrices and their codes. Communications and Coding, 2, 3. Massey, J. L. (1998). Orthogonal, antiorthogonal and self-orthogonal matrices and their codes. Communications and Coding, 2, 3.
6.
go back to reference Naor, M., & Rothblum, G. N. (2005). The complexity of online memory checking. In 46th annual IEEE symposium on foundations of computer science, 2005 (FOCS 2005) (pp. 573–582). IEEE. Naor, M., & Rothblum, G. N. (2005). The complexity of online memory checking. In 46th annual IEEE symposium on foundations of computer science, 2005 (FOCS 2005) (pp. 573–582). IEEE.
7.
go back to reference Nguyen, T. D., & Dang, V. H. (2013). Quasi-inverse based cryptography. In Computational science and its applications—ICCSA 2013 (pp. 629–642). Springer. Nguyen, T. D., & Dang, V. H. (2013). Quasi-inverse based cryptography. In Computational science and its applications—ICCSA 2013 (pp. 629–642). Springer.
8.
go back to reference Penrose, R. (1995). A generalized inverse for matrices. In Proceedings of the Cambridge Philosophy Society (Vol. 51, pp. 406–413). Cambridge University Press. Penrose, R. (1995). A generalized inverse for matrices. In Proceedings of the Cambridge Philosophy Society (Vol. 51, pp. 406–413). Cambridge University Press.
9.
go back to reference Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Advances in cryptology—ASIACRYPT 2008 (pp. 90–107). Springer. Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Advances in cryptology—ASIACRYPT 2008 (pp. 90–107). Springer.
10.
go back to reference Van, D. H., & Thuc, N. D. (2015). Pseudoinverse matrix over finite field and its applications. In K. J. Kim (Ed.), Information science and applications (pp. 491–498). Berlin: Springer. Van, D. H., & Thuc, N. D. (2015). Pseudoinverse matrix over finite field and its applications. In K. J. Kim (Ed.), Information science and applications (pp. 491–498). Berlin: Springer.
11.
go back to reference Wang, C., Chow, S. S., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.MathSciNetCrossRef Wang, C., Chow, S. S., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.MathSciNetCrossRef
12.
go back to reference Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE.
Metadata
Title
Construction of Pseudoinverse Matrix Over Finite Field and Its Applications
Authors
Van H. Dang
Thuc D. Nguyen
Publication date
27-10-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3095-6

Other articles of this Issue 3/2017

Wireless Personal Communications 3/2017 Go to the issue