Title :
Outsourcing of Verifiable Composite Modular Exponentiations
Author :
Jie Liu ; Bo Yang ; Zhiguo Du
Author_Institution :
Coll. of Inf., South China Agric. Univ., Guangzhou, China
Abstract :
Modular exponentiation as a basic operation is widely used in discrete-log based cryptographic protocols. Most research has been made for outsourcing exponentiation modular a prime, works for outsourcing composite modular exponentiation are rare. In this paper, we propose two new secure outsourcing protocols for verifiable composite modular exponentiation and batch composite modular exponentiations respectively. We analyze the security and complexity of the protocols. Ours are more efficient.
Keywords :
cryptographic protocols; composite modular exponentiation outsourcing; discrete-log based cryptographic protocols; outsourcing protocols; protocol complexity; protocol security; verifiable composite modular exponentiation; Educational institutions; Outsourcing; Protocols; Public key cryptography; Servers; Modular exponentiation; Verifiable Computing; outsourcing computation;
Conference_Titel :
Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on
Conference_Location :
Xi´an
DOI :
10.1109/INCoS.2013.102