Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications

被引:7
作者
Hu, Qilin [1 ]
Duan, Mingxing [1 ]
Yang, Zhibang [2 ]
Yu, Siyang [3 ]
Xiao, Bin [4 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] Changsha Univ, Hunan Prov Key Lab Ind Internet Technol & Secur, Changsha 410022, Peoples R China
[3] Hunan Univ Finance & Econ, Coll Informat Technol & Management, Changsha 410000, Peoples R China
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
基金
中国博士后科学基金;
关键词
Outsourcing; Servers; Cloud computing; Task analysis; Cryptography; Internet of Things; Internet of Things (IoT); modular exponentiation; parallel algorithm; secure outsourcing; DIGITAL-SIGNATURES; RSA; CHALLENGES; ALGORITHMS;
D O I
10.1109/JIOT.2020.3029030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modular exponentiation, an operation widely utilized in cryptographic protocols to transfer text and other forms of data, can also be applied to Internet-of-Things (IoT) devices with high security requirements. However, due to the high resource consumption of modular exponentiation, IoT devices can face the problem of resource insufficient. Fortunately, the secure outsourcing scheme offers a new solution for resource-constrained devices. In this article, we apply a parallel secure outsourcing scheme to provide the possibility for modular exponentiation operation, which is used in the IoT devices. After that, the task of modular exponentiation is decomposed and we introduce the scheme in more detail. In addition, based on this scheme, we designed an extension scheme for RSA, providing enhanced security for IoT devices. Finally, the analysis of experimental results based on 512-4096 b of data indicates the superiority in scalability and time consumption over the previous schemes.
引用
收藏
页码:12782 / 12791
页数:10
相关论文
共 46 条
  • [1] Aledhari Mohammed, 2019, 2019 IEEE International Conference on Industrial Internet (ICII). Proceedings, P233, DOI 10.1109/ICII.2019.00049
  • [2] [Anonymous], 1998, SORTING SEARCHING
  • [3] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [4] Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
  • [5] Parallel algorithms for modular multi-exponentiation
    Borges, Fabio
    Lara, Pedro
    Portugal, Renato
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2017, 292 : 406 - 416
  • [6] Oblivious Parallel RAM and Applications
    Boyle, Elette
    Chung, Kai-Min
    Pass, Rafael
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 : 175 - 204
  • [7] Parallel computation of the multi-exponentiation for cryptosystems
    Chang, CC
    Lou, DC
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1997, 63 (1-2) : 9 - 26
  • [8] Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
  • [9] A Bi-layered Parallel Training Architecture for Large-Scale Convolutional Neural Networks
    Chen, Jianguo
    Li, Kenli
    Bilal, Kashif
    Zhou, Xu
    Li, Keqin
    Yu, Philip S.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (05) : 965 - 976
  • [10] Chen Jianguo, 2018, IEEE/ACM Trans Comput Biol Bioinform, DOI 10.1109/TCBB.2018.2868088