CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2017-11-01
|
Series: | Digital Communications and Networks |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352864817300779 |
id |
doaj-e228389647c44eff8c5cf2dde4bace9b |
---|---|
record_format |
Article |
spelling |
doaj-e228389647c44eff8c5cf2dde4bace9b2021-02-02T01:43:16ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482017-11-013423624110.1016/j.dcan.2017.05.001CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted serverShuai Li0Longxia Huang1Anmin Fu2John Yearwood3School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaSchool of Information Technology, Deakin University, Geelong, VIC 3220, AustraliaOutsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex computing tasks in discrete-log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsource modular exponentiation operation to only a single server, which eliminates the potential for a collusion attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to cloud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability. The user could detect any misbehavior with a probability of one if the server returns a fault result.http://www.sciencedirect.com/science/article/pii/S2352864817300779Cloud computingOutsourcing computationVerifiable computationModular exponentiation |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shuai Li Longxia Huang Anmin Fu John Yearwood |
spellingShingle |
Shuai Li Longxia Huang Anmin Fu John Yearwood CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server Digital Communications and Networks Cloud computing Outsourcing computation Verifiable computation Modular exponentiation |
author_facet |
Shuai Li Longxia Huang Anmin Fu John Yearwood |
author_sort |
Shuai Li |
title |
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server |
title_short |
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server |
title_full |
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server |
title_fullStr |
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server |
title_full_unstemmed |
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server |
title_sort |
cexp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server |
publisher |
KeAi Communications Co., Ltd. |
series |
Digital Communications and Networks |
issn |
2352-8648 |
publishDate |
2017-11-01 |
description |
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex computing tasks in discrete-log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsource modular exponentiation operation to only a single server, which eliminates the potential for a collusion attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to cloud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability. The user could detect any misbehavior with a probability of one if the server returns a fault result. |
topic |
Cloud computing Outsourcing computation Verifiable computation Modular exponentiation |
url |
http://www.sciencedirect.com/science/article/pii/S2352864817300779 |
work_keys_str_mv |
AT shuaili cexpsecureandverifiableoutsourcingofcompositemodularexponentiationwithsingleuntrustedserver AT longxiahuang cexpsecureandverifiableoutsourcingofcompositemodularexponentiationwithsingleuntrustedserver AT anminfu cexpsecureandverifiableoutsourcingofcompositemodularexponentiationwithsingleuntrustedserver AT johnyearwood cexpsecureandverifiableoutsourcingofcompositemodularexponentiationwithsingleuntrustedserver |
_version_ |
1724311223245209600 |