4.2 Article

Secure outsourcing of modular exponentiations under single untrusted programme model

期刊

出版社

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jcss.2016.11.005

关键词

Modular exponentiations; Secure outsourcing; Untrusted server; High checkability

资金

  1. Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing [2015QYJ04]
  2. Open Research Subject of the Lab of Security Insurance of Cyberspace, Sichuan Province [szjj2016-091]
  3. enterprise information and control technology about internet of things in Sichuan province key laboratory of colleges and universities [2014WYJ03]
  4. Science Founding of Artificial Intelligence Key Laboratory of Sichuan Province [2014RYJ06]
  5. Sichuan University of Science and Engineering [2013KY02]
  6. National Natural Science Foundation of China [U1501252]
  7. Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing [2015QYJ04]
  8. Open Research Subject of the Lab of Security Insurance of Cyberspace, Sichuan Province [szjj2016-091]
  9. enterprise information and control technology about internet of things in Sichuan province key laboratory of colleges and universities [2014WYJ03]
  10. Science Founding of Artificial Intelligence Key Laboratory of Sichuan Province [2014RYJ06]
  11. Sichuan University of Science and Engineering [2013KY02]
  12. National Natural Science Foundation of China [U1501252]

向作者/读者索取更多资源

Cloud computing gathers a lot of computing resources together, and provides cheap, efficient and convenient services. With the development of cloud computing, the importance of security issues is increasing. Modular exponentiations are one of the basic and expensive operations of public key cryptography. We consider the single untrusted programed model of modular exponentiations outsourcing algorithm in this paper. A new secure outsourcing of modular exponentiations scheme is proposed under this model. In this scheme, a new logical split method about modular exponentiation is put forward. The modular exponentiation is divided into several parts and a random value is kept for verification. The exponent and the base of modular exponentiations are keeping privacy in the process of outsourcing. The computational burden for users in the process of outsourcing is small, and the users can verify the results with high checkability. (C) 2016 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据