4.4 Article

Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud

Journal

COMPUTER JOURNAL
Volume 63, Issue 8, Pages 1271-1284

Publisher

OXFORD UNIV PRESS
DOI: 10.1093/comjnl/bxz165

Keywords

cloud computing; security; secure outsource computation; composite modular exponentiation; single untrusted cloud

Funding

  1. National Natural Science Foundation of China [61772514, 61602061]

Ask authors/readers for more resources

Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. u(a) mod N. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. Pi(n)(i=1) u(i)(ai). Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we showthat the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir's identity-based signature and identity-based multi-signature.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available