4.8 Article

Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 16, 页码 12782-12791

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3029030

关键词

Outsourcing; Servers; Cloud computing; Task analysis; Cryptography; Internet of Things; Cloud computing; Internet of Things (IoT); modular exponentiation; parallel algorithm; secure outsourcing

资金

  1. NSFC [61902119, 61802032, 61772182]
  2. China Postdoctoral Science Foundation [2019M652758, 2019TQ0087]
  3. Key Area Research Program of Hunan [2019GK2091]
  4. Hunan Province Key Laboratory of Industrial Internet Technology and Security [2019TP1011]
  5. Outstanding Youth of Department of Education of Hunan Province [18B483]

向作者/读者索取更多资源

This article introduces a parallel secure outsourcing scheme for modular exponentiation operation in IoT devices with resource constraints, providing enhanced security and efficiency. Experimental results indicate the superiority of the scheme in scalability and time consumption over previous methods.
Modular exponentiation, an operation widely utilized in cryptographic protocols to transfer text and other forms of data, can also be applied to Internet-of-Things (IoT) devices with high security requirements. However, due to the high resource consumption of modular exponentiation, IoT devices can face the problem of resource insufficient. Fortunately, the secure outsourcing scheme offers a new solution for resource-constrained devices. In this article, we apply a parallel secure outsourcing scheme to provide the possibility for modular exponentiation operation, which is used in the IoT devices. After that, the task of modular exponentiation is decomposed and we introduce the scheme in more detail. In addition, based on this scheme, we designed an extension scheme for RSA, providing enhanced security for IoT devices. Finally, the analysis of experimental results based on 512-4096 b of data indicates the superiority in scalability and time consumption over the previous schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据