CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server

Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex...

Full description

Bibliographic Details
Main Authors: Shuai Li, Longxia Huang, Anmin Fu, John Yearwood
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2017-11-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864817300779
id doaj-e228389647c44eff8c5cf2dde4bace9b
record_format Article
spelling doaj-e228389647c44eff8c5cf2dde4bace9b2021-02-02T01:43:16ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482017-11-013423624110.1016/j.dcan.2017.05.001CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted serverShuai Li0Longxia Huang1Anmin Fu2John Yearwood3School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaSchool of Information Technology, Deakin University, Geelong, VIC 3220, AustraliaOutsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex computing tasks in discrete-log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsource modular exponentiation operation to only a single server, which eliminates the potential for a collusion attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to cloud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability. The user could detect any misbehavior with a probability of one if the server returns a fault result.http://www.sciencedirect.com/science/article/pii/S2352864817300779Cloud computingOutsourcing computationVerifiable computationModular exponentiation
collection DOAJ
language English
format Article
sources DOAJ
author Shuai Li
Longxia Huang
Anmin Fu
John Yearwood
spellingShingle Shuai Li
Longxia Huang
Anmin Fu
John Yearwood
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
Digital Communications and Networks
Cloud computing
Outsourcing computation
Verifiable computation
Modular exponentiation
author_facet Shuai Li
Longxia Huang
Anmin Fu
John Yearwood
author_sort Shuai Li
title CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
title_short CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
title_full CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
title_fullStr CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
title_full_unstemmed CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
title_sort cexp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
publisher KeAi Communications Co., Ltd.
series Digital Communications and Networks
issn 2352-8648
publishDate 2017-11-01
description Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex computing tasks in discrete-log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsource modular exponentiation operation to only a single server, which eliminates the potential for a collusion attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to cloud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability. The user could detect any misbehavior with a probability of one if the server returns a fault result.
topic Cloud computing
Outsourcing computation
Verifiable computation
Modular exponentiation
url http://www.sciencedirect.com/science/article/pii/S2352864817300779
work_keys_str_mv AT shuaili cexpsecureandverifiableoutsourcingofcompositemodularexponentiationwithsingleuntrustedserver
AT longxiahuang cexpsecureandverifiableoutsourcingofcompositemodularexponentiationwithsingleuntrustedserver
AT anminfu cexpsecureandverifiableoutsourcingofcompositemodularexponentiationwithsingleuntrustedserver
AT johnyearwood cexpsecureandverifiableoutsourcingofcompositemodularexponentiationwithsingleuntrustedserver
_version_ 1724311223245209600