期刊
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
卷 90, 期 -, 页码 1-13出版社
ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jcss.2016.11.005
关键词
Modular exponentiations; Secure outsourcing; Untrusted server; High checkability
资金
- Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing [2015QYJ04]
- Open Research Subject of the Lab of Security Insurance of Cyberspace, Sichuan Province [szjj2016-091]
- enterprise information and control technology about internet of things in Sichuan province key laboratory of colleges and universities [2014WYJ03]
- Science Founding of Artificial Intelligence Key Laboratory of Sichuan Province [2014RYJ06]
- Sichuan University of Science and Engineering [2013KY02]
- National Natural Science Foundation of China [U1501252]
- Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing [2015QYJ04]
- Open Research Subject of the Lab of Security Insurance of Cyberspace, Sichuan Province [szjj2016-091]
- enterprise information and control technology about internet of things in Sichuan province key laboratory of colleges and universities [2014WYJ03]
- Science Founding of Artificial Intelligence Key Laboratory of Sichuan Province [2014RYJ06]
- Sichuan University of Science and Engineering [2013KY02]
- National Natural Science Foundation of China [U1501252]
Cloud computing gathers a lot of computing resources together, and provides cheap, efficient and convenient services. With the development of cloud computing, the importance of security issues is increasing. Modular exponentiations are one of the basic and expensive operations of public key cryptography. We consider the single untrusted programed model of modular exponentiations outsourcing algorithm in this paper. A new secure outsourcing of modular exponentiations scheme is proposed under this model. In this scheme, a new logical split method about modular exponentiation is put forward. The modular exponentiation is divided into several parts and a random value is kept for verification. The exponent and the base of modular exponentiations are keeping privacy in the process of outsourcing. The computational burden for users in the process of outsourcing is small, and the users can verify the results with high checkability. (C) 2016 Elsevier Inc. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据