Title :
On some mathematical aspects of data protection in cloud computing
Author :
Ustimenko, Vasyl
Author_Institution :
Inst. of Math., Maria Curie-Sklodowska Univ., Lublin, Poland
Abstract :
The talk is dedicated to ideas of Holomorphic Encryption and Multivariate Key Dependent Cryptography. We observe recent theoretical results on the mentioned above topics together with their Applications to Cloud Security. Post Quantum Cryptography could not use many security tools based on Number Theory, because of the factorization algorithm developed by Peter Shor. This fact and fast development of Computer algebra make multivariate cryptography an important direction of research. The idea of key dependent cryptography looks promising for applications in Clouds, because the size of the key allows to control the speed of execution and security level. We will discuss recent results on key dependent multivariate cryptography. Finally, special classes of finite rings turned out to be very useful in holomorphic encryption and for the development of multivariate key dependent algorithms.
Keywords :
cloud computing; cryptography; process algebra; cloud computing; cloud security; computer algebra; data protection; factorization algorithm; holomorphic encryption; multivariate key dependent cryptography; number theory; post quantum cryptography; Cloud computing; Educational institutions; Encryption; Mathematics; Public key cryptography; clound computing security; holomorphic encryption; key dependent cryptography; multivariate cryptography; quantum computing;
Conference_Titel :
High Performance Computing and Simulation (HPCS), 2012 International Conference on
Conference_Location :
Madrid
Print_ISBN :
978-1-4673-2359-8
DOI :
10.1109/HPCSim.2012.6266894