z-logo
open-access-imgOpen Access
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
Author(s) -
Shuai Li,
Longxia Huang,
Anmin Fu,
John Yearwood
Publication year - 2017
Publication title -
digital communications and networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.082
H-Index - 26
eISSN - 2468-5925
pISSN - 2352-8648
DOI - 10.1016/j.dcan.2017.05.001
Subject(s) - modular exponentiation , computer science , server , cloud computing , outsourcing , exponentiation , cryptography , computer network , modular design , distributed computing , computer security , algorithm , public key cryptography , operating system , encryption , mathematics , mathematical analysis , political science , law
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex computing tasks in discrete-log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsource modular exponentiation operation to only a single server, which eliminates the potential for a collusion attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to cloud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability. The user could detect any misbehavior with a probability of one if the server returns a fault result

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom