{"title":"论云计算中数据保护的一些数学方面","authors":"V. Ustimenko","doi":"10.1109/HPCSim.2012.6266894","DOIUrl":null,"url":null,"abstract":"The talk is dedicated to ideas of Holomorphic Encryption and Multivariate Key Dependent Cryptography. We observe recent theoretical results on the mentioned above topics together with their Applications to Cloud Security. Post Quantum Cryptography could not use many security tools based on Number Theory, because of the factorization algorithm developed by Peter Shor. This fact and fast development of Computer algebra make multivariate cryptography an important direction of research. The idea of key dependent cryptography looks promising for applications in Clouds, because the size of the key allows to control the speed of execution and security level. We will discuss recent results on key dependent multivariate cryptography. Finally, special classes of finite rings turned out to be very useful in holomorphic encryption and for the development of multivariate key dependent algorithms.","PeriodicalId":428764,"journal":{"name":"2012 International Conference on High Performance Computing & Simulation (HPCS)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"On some mathematical aspects of data protection in cloud computing\",\"authors\":\"V. Ustimenko\",\"doi\":\"10.1109/HPCSim.2012.6266894\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The talk is dedicated to ideas of Holomorphic Encryption and Multivariate Key Dependent Cryptography. We observe recent theoretical results on the mentioned above topics together with their Applications to Cloud Security. Post Quantum Cryptography could not use many security tools based on Number Theory, because of the factorization algorithm developed by Peter Shor. This fact and fast development of Computer algebra make multivariate cryptography an important direction of research. The idea of key dependent cryptography looks promising for applications in Clouds, because the size of the key allows to control the speed of execution and security level. We will discuss recent results on key dependent multivariate cryptography. Finally, special classes of finite rings turned out to be very useful in holomorphic encryption and for the development of multivariate key dependent algorithms.\",\"PeriodicalId\":428764,\"journal\":{\"name\":\"2012 International Conference on High Performance Computing & Simulation (HPCS)\",\"volume\":\"146 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on High Performance Computing & Simulation (HPCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HPCSim.2012.6266894\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on High Performance Computing & Simulation (HPCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HPCSim.2012.6266894","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On some mathematical aspects of data protection in cloud computing
The talk is dedicated to ideas of Holomorphic Encryption and Multivariate Key Dependent Cryptography. We observe recent theoretical results on the mentioned above topics together with their Applications to Cloud Security. Post Quantum Cryptography could not use many security tools based on Number Theory, because of the factorization algorithm developed by Peter Shor. This fact and fast development of Computer algebra make multivariate cryptography an important direction of research. The idea of key dependent cryptography looks promising for applications in Clouds, because the size of the key allows to control the speed of execution and security level. We will discuss recent results on key dependent multivariate cryptography. Finally, special classes of finite rings turned out to be very useful in holomorphic encryption and for the development of multivariate key dependent algorithms.