DocumentCode :
711885
Title :
A New Algorithm for Secure Outsourcing Composite Modular Exponentiation
Author :
Jie Liu ; Bo Yang
Author_Institution :
Coll. of Inf., South China Agric. Univ., Guangzhou, China
fYear :
2015
fDate :
24-26 April 2015
Firstpage :
461
Lastpage :
465
Abstract :
Modular exponentiations are widely used in discrete-log based cryptographic protocols. Most researches have been done for outsourcing exponentiation modular a prime, while less work has been done for outsourcing exponentiation modular a composite. In this paper, we first raise a new secure outsourcing algorithm for exponentiation modular a composite in the one malicious model. Then, we prove that this algorithm is secure in the one-malicious model and give efficiency analysis later. Comparing with other algorithms, ours is more efficient for composite modular exponentiation. Finally, we use this algorithm to realize a outsource-secure algorithm for Shamir´s Identitybased Signature scheme.
Keywords :
cryptographic protocols; digital signatures; outsourcing; discrete-log based cryptographic protocols; efficiency analysis; identity-based signature scheme; malicious model; outsource-secure algorithm; secure composite modular exponentiation outsourcing; Algorithm design and analysis; Computational modeling; Cryptography; Gold; Outsourcing; Software; Cloud computation; Modular exponentiation; Outsourcing computation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Science and Control Engineering (ICISCE), 2015 2nd International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4673-6849-0
Type :
conf
DOI :
10.1109/ICISCE.2015.107
Filename :
7120647
Link To Document :
بازگشت