DocumentCode :
705616
Title :
Secure Outsourcing of Multiple Modular Exponentiations
Author :
Jinyang Li ; Jun Ye
Author_Institution :
State Key Lab. of Integrated Service Networks (ISN), Xidian Univ., Xi´an, China
fYear :
2015
fDate :
24-27 March 2015
Firstpage :
808
Lastpage :
811
Abstract :
Modular exponentiation with a large modulus, which is usually accomplished by repeated modular multiplications, has been widely used in public key cryptosystems for secure data communications. Hohenberger and Lysyanskaya [14] proposed the first algorithm for secure outsourcing of modular exponentiations, and then Chen et al. [16] improved the algorithm, which can implement simultaneous modular exponentiations of u1au2b. In this paper, we present a secure algorithm for resource-constrained customers, who outsource simulataneous modular exponentiations operation, a task of intensive computation workload, to untrusted servers in the model with one malicious adversary. Based on Chen´s algorithm, our algorithm achieves n simultaneous modular exponentiations in outsourcing computation. Compared with [14] and [16], our algorithm is more efficiency.
Keywords :
data communication; public key cryptography; telecommunication security; Chen´s algorithm; data communications; intensive computation; multiple modular exponentiations secure outsourcing; public key cryptosystems; resource-constrained customers; servers; simulataneous modular exponentiations operation; Cloud computing; Computational modeling; Encryption; Outsourcing; Servers; cloud computing; multiple modular exponentiations; outsource-secure algorithms;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on
Conference_Location :
Gwangiu
ISSN :
1550-445X
Print_ISBN :
978-1-4799-7904-2
Type :
conf
DOI :
10.1109/AINA.2015.272
Filename :
7098057
Link To Document :
بازگشت