Sciweavers

Share
IACR
2016

New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations

5 years 6 months ago
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
Abstract: Outsourcing paradigm is one of the most attractive benefits of cloud computing, where computation workloads can be outsourced to cloud servers by the resourceconstrained devices, such as RFID tags. With this paradigm, cloud users can avoid setting up their own infrastructures. As a result, some new challenges, such as security and checkability, are inevitably introduced. In this paper, we address the problem of secure outsourcing algorithm for modular exponentiations in the one-malicious version of two untrusted program model. We show that our proposed algorithm is more efficient than the state-of-the-art algorithms. On the other hand, we point out in this paper that the first outsource-secure algorithm for simultaneous modular exponentiations proposed recently is insecure, where the sensitive information can be leaked to the malicious servers. As a result, we propose a new and more efficient algorithm for simultaneous modular exponentiations. We also propose the constructi...
Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
Added 03 Apr 2016
Updated 03 Apr 2016
Type Journal
Year 2016
Where IACR
Authors Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
Comments (0)
books