The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations

Shaojing FU, Yunpeng YU, Ming XU

  • Full Text Views

    0

  • Cite this

Summary :

Cloud computing enables computational resource-limited devices to economically outsource much computations to the cloud. Modular exponentiation is one of the most expensive operations in public key cryptographic protocols, and such operation may be a heavy burden for the resource-constraint devices. Previous works for secure outsourcing modular exponentiation which use one or two untrusted cloud server model or have a relatively large computational overhead, or do not support the 100% possibility for the checkability. In this letter, we propose a new efficient and verifiable algorithm for securely outsourcing modular exponentiation in the two untrusted cloud server model. The algorithm improves efficiency by generating random pairs based on EBPV generators, and the algorithm has 100% probability for the checkability while preserving the data privacy.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E103-A No.1 pp.221-224
Publication Date
2020/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.2019CIL0002
Type of Manuscript
Special Section LETTER (Special Section on Cryptography and Information Security)
Category

Authors

Shaojing FU
  National University of Defense Technology,Sate Key Laboratory of Cryptology
Yunpeng YU
  National University of Defense Technology,Sate Key Laboratory of Cryptology
Ming XU
  National University of Defense Technology,Sate Key Laboratory of Cryptology

Keyword