Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Construction of Pseudoinverse Matrix Over Finite Field and Its Applications

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the development of smart devices like smart phones or tablets, etc., the challenging point for these devices is risen in the security problems required limited computational capacity, which attracts researchers in both academia and industrial societies. In this paper, we tackle two interesting security problems: changing a shared key between two users and privacy-preserving auditing for cloud storage. Our solution is a linear computational and one way method based on pseudoinverse matrix, a generalization concept of inverse matrix. In addition, this can be applied for devices with limited computational capacity due to its fast computation. Indeed, we conduct two experiments to show its efficiency in computation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. \(\alpha ,\beta ,\gamma ,\delta\) always exist due to the Lagrange’s Four Square Theorem.

References

  1. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., et al. (2011). Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 14(1), 12.

    Article  Google Scholar 

  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security (pp. 598–609). ACM.

  3. Ben-Israel, A., & Greville, T. N. (2003). Generalized inverses. New York: Springer.

    MATH  Google Scholar 

  4. Juels, A., & Kaliski Jr. B. S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584–597). ACM.

  5. Massey, J. L. (1998). Orthogonal, antiorthogonal and self-orthogonal matrices and their codes. Communications and Coding, 2, 3.

    Google Scholar 

  6. Naor, M., & Rothblum, G. N. (2005). The complexity of online memory checking. In 46th annual IEEE symposium on foundations of computer science, 2005 (FOCS 2005) (pp. 573–582). IEEE.

  7. Nguyen, T. D., & Dang, V. H. (2013). Quasi-inverse based cryptography. In Computational science and its applications—ICCSA 2013 (pp. 629–642). Springer.

  8. Penrose, R. (1995). A generalized inverse for matrices. In Proceedings of the Cambridge Philosophy Society (Vol. 51, pp. 406–413). Cambridge University Press.

  9. Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Advances in cryptology—ASIACRYPT 2008 (pp. 90–107). Springer.

  10. Van, D. H., & Thuc, N. D. (2015). Pseudoinverse matrix over finite field and its applications. In K. J. Kim (Ed.), Information science and applications (pp. 491–498). Berlin: Springer.

  11. Wang, C., Chow, S. S., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.

    Article  MathSciNet  Google Scholar 

  12. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Van H. Dang.

Additional information

This work is extended from [7, 10]. The main extension consists proposing an algorithm to construct pseudoinverse matrix over a finite field using row-self-orthogonal matrix and conducting experiments to show fast linear computation on pseudoinverse matrices.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dang, V.H., Nguyen, T.D. Construction of Pseudoinverse Matrix Over Finite Field and Its Applications. Wireless Pers Commun 94, 455–466 (2017). https://doi.org/10.1007/s11277-015-3095-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3095-6

Keywords

Navigation