CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server

Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex...

Full description

Bibliographic Details
Main Authors: Shuai Li, Longxia Huang, Anmin Fu, John Yearwood
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2017-11-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864817300779