4.7 Article

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields

期刊

INFORMATION SCIENCES
卷 512, 期 -, 页码 641-660

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2019.10.007

关键词

Cloud computing; Computation outsourcing; Unimodular matrix transformation; Extended euclidean algorithm; Large-scale polynomials

资金

  1. National Natural Science Foundation of China [61702294]
  2. Natural Science Foundation of Shandong Province [ZR2016FQ02]
  3. National Development Foundation of Cryptography [MM1120170126, MMJJ20170118]
  4. State Key Laboratory of Information Security in Institute of Information Engineering, Chinese Academy of Sciences [2016-MS -23]
  5. Applied Basic Research Project of Qingdao City [17-1-1-10-jch]

向作者/读者索取更多资源

Cloud computing gives resource-constrained clients great conveniences to outsource exorbitant computations to a public cloud. The extended Euclidean algorithm with large-scale polynomials over finite fields is fundamental and widespread in computer science and cryptography, yet it is computationally overloaded for quantities of lightweight devices emerged with the dawn of internet of things (IoT). In this respect, we design an efficient outsourcing algorithm that enables a lightweight client to achieve this heavy computation with the assistance of a remote cloud server. By comprehensively employing the variable substitution, random polynomial-based blind technique and unimodular matrix transformation, our algorithm achieves the goals of cheating resistance, privacy preservation, and high efficiency. Concretely, our algorithm is based on single untrusted program model which avoids the too strong security assumption between multiple servers, and it enables the client to detect the cloud's misbehaviors with (optimal) probability 1. Also, Thorough theoretical analysis indicates that the algorithm provides robust input/output privacy. Moreover, the algorithm only needs one round interaction between the client and the cloud. Strict theoretical analysis and extensive experimental evaluations demonstrate our algorithm's practical efficiency and effectiveness. Finally, an important application of our algorithm on securely outsourcing the expensive key generation step of NTRU cryptosystem is given. (C) 2019 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据