Title :
Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing
Author :
Ma, Xu ; Li, Jin ; Zhang, Fangguo
Author_Institution :
Sch. of Inf. Sci. & Technol., Sun Yat-Sen Univ., Guangzhou, China
Abstract :
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for security when users want to securely outsource the computation of cryptographic operations to the untrusted cloud servers. As we know, modular exponentiation is one of basic operations among most of current cryptosystems. In this paper, we present two generic secure outsourcing schemes enabling users to securely outsource the computations of exponentiations to cloud servers. The first one is a secure outsourcing scheme for fixed base-variable exponent exponentiation, while the second is for fixed exponent-variable base exponentiation. With our techniques, a batch of exponentiations (eg. t exponentiations) can be efficiently computed by the user with only (n+t) multiplications, where n is the number of bits of the exponent. Furthermore, there is not any pre-computation on the user side. The schemes are proved to be secure under the Hidden Subset Sum Problem.
Keywords :
cloud computing; cryptography; outsourcing; Hidden Subset Sum Problem; IT resources; Internet; cloud computing; cryptographic operations; cryptosystems; fixed base-variable exponent exponentiation; fixed exponent-variable base exponentiation; secure batch exponentiations outsourcing; secure outsourcing schemes; untrusted cloud servers; Cloud computing; Complexity theory; Educational institutions; Outsourcing; Protocols; Security; Servers; Cloud computing; Modular exponentiation; Outsourcing; Privacy;
Conference_Titel :
Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference on
Conference_Location :
Bucharest
Print_ISBN :
978-1-4673-2279-9
DOI :
10.1109/iNCoS.2012.31