Autosoft Journal

Online Manuscript Access

Verifiable Outsourcing of High-Degree Polynomials and its Application in Keyword Search



In big data era, people cannot afford more and more complex computation work due to the constrained computation resources. The high reliability, strong processing capacity, large storage space of cloud computing makes the resource-constrained clients remotely operate the heavy computation task with the help of cloud server. In this paper, a new algorithm for secure outsourcing of high degree polynomials is proposed. We introduce a camouflage technique, which the real polynomial will be disguised to the untrusted cloud server. In addition, the input and output will not be revealed in the computation process and the clients can easily verify the returned result. The application of the secure outsourcing algorithm in keyword search system is also studied. A verification technique for keyword search is generated based on the outsourcing algorithm. The client can easily verify whether the server faithfully implement the search work in the whole ciphertext space. If the server does not implement the search work and returns the client “null” to indicate there is no files with the query keyword, the client can easily verify whether there are some related files in the ciphertext database.



Total Pages: 6
Pages: 41-46


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways

Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Volume: 24
Issue: 1
Year: 2018

Cite this document


Atallah, Mikhail J. et al. "Secure Outsourcing of Scientific Computations." Trends in Software Engineering (2002): 215-272. Crossref. Web.

Hu, Chuanping et al. "Semantic Link Network-Based Model for Organizing Multimedia Big Data." IEEE Transactions on Emerging Topics in Computing 2.3 (2014): 376-387. Crossref. Web.

Xu, Zheng et al. "Crowdsourcing Based Description of Urban Emergency Events Using Social Media Big Data." IEEE Transactions on Cloud Computing (2016): 1-1. Crossref. Web.

Xu, Zheng et al. "Building Knowledge Base of Urban Emergency Events Based on Crowdsourcing of Social Media." Concurrency and Computation: Practice and Experience 28.15 (2016): 4038-4052. Crossref. Web.

Xu, Zheng et al. "Participatory Sensing-Based Semantic and Spatial Analysis of Urban Emergency Events Using Mobile Social Media." EURASIP Journal on Wireless Communications and Networking 2016.1 (2016): n. pag. Crossref. Web.

Xu, Zheng et al. "Building the Search Pattern of Web Users Using Conceptual Semantic Space Model." International Journal of Web and Grid Services 12.3 (2016): 328. Crossref. Web.

Ye, Jun et al. "Fine-Grained Searchable Encryption in Multi-User Setting." Soft Computing 21.20 (2016): 6201-6212. Crossref. Web.

Ye, Jun, Zheng Xu, and Yong Ding. "Secure Outsourcing of Modular Exponentiations in Cloud and Cluster Computing." Cluster Computing 19.2 (2016): 811-820. Crossref. Web.

Ye J. Int. J. Netw. Secur


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)

SJR: "The two years line is equivalent to journal impact factor ™ (Thomson Reuters) metric."

Journal: 1995-Present


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048