DocumentCode :
3512842
Title :
Outsourcing of Verifiable Composite Modular Exponentiations
Author :
Jie Liu ; Bo Yang ; Zhiguo Du
Author_Institution :
Coll. of Inf., South China Agric. Univ., Guangzhou, China
fYear :
2013
fDate :
9-11 Sept. 2013
Firstpage :
546
Lastpage :
551
Abstract :
Modular exponentiation as a basic operation is widely used in discrete-log based cryptographic protocols. Most research has been made for outsourcing exponentiation modular a prime, works for outsourcing composite modular exponentiation are rare. In this paper, we propose two new secure outsourcing protocols for verifiable composite modular exponentiation and batch composite modular exponentiations respectively. We analyze the security and complexity of the protocols. Ours are more efficient.
Keywords :
cryptographic protocols; composite modular exponentiation outsourcing; discrete-log based cryptographic protocols; outsourcing protocols; protocol complexity; protocol security; verifiable composite modular exponentiation; Educational institutions; Outsourcing; Protocols; Public key cryptography; Servers; Modular exponentiation; Verifiable Computing; outsourcing computation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on
Conference_Location :
Xi´an
Type :
conf
DOI :
10.1109/INCoS.2013.102
Filename :
6630472
Link To Document :
بازگشت