Secure outsourcing of modular exponentiations in cloud and cluster computing

被引:31
作者
Ye, Jun [1 ]
Xu, Zheng [2 ]
Ding, Yong [3 ]
机构
[1] Sichuan Univ Sci & Engn, Sichuan Prov Univ Key Lab Bridge Nondestruct Dete, Artificial Intelligence Key Lab Sichuan Prov, Chengdu, Sichuan, Peoples R China
[2] Minist Publ Secur, Res Inst 3, Shanghai, Peoples R China
[3] Guilin Univ Elect Technol, Sch Math & Comp Sci, Guangxi Key Lab Cryptog & Informat Secur, Guangxi, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2016年 / 19卷 / 02期
关键词
Modular exponentiations; Outsourcing computation; Verification; Cloud computing; SERVER-AIDED VERIFICATION;
D O I
10.1007/s10586-016-0571-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and cluster computing are user-centric computing services. The shared software and hardware resources and information can be provided to the computers and other equipments according to the demands of users. A majority of services are deployed through outsourcing. Outsourcing computation allows resource-constrained clients to outsource their complex computation workloads to a powerful server which is rich of computation resources. Modular exponentiation is one of the most complex computations in public key based cryptographic schemes. It is useful to reduce the computation cost of the clients by using outsourcing computation. In this paper, we propose a novel outsourcing algorithm for modular exponentiation based on the new mathematical division under the setting of two non-colluding cloud servers. The base and the power of the outsourced data can be kept private and the efficiency is improved compared with former works.
引用
收藏
页码:811 / 820
页数:10
相关论文
共 30 条
[1]   ON HIDING INFORMATION FROM AN ORACLE [J].
ABADI, M ;
FEIGENBAUM, J ;
KILIAN, J .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1989, 39 (01) :21-50
[2]  
[Anonymous], 1991, DISTRIBUTED COMPUTIN
[3]  
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[4]  
Atallah MJ, 2001, ADV COMPUT, V54, P215
[5]  
BEAVER D, 1990, LECT NOTES COMPUT SC, V415, P37
[6]   Locally random reductions: Improvements and applications [J].
Beaver, D ;
Feigenbaum, J ;
Kilian, J ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 1997, 10 (01) :17-36
[7]  
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[8]   Private and Cheating-Free Outsourcing of Algebraic Computations [J].
Benjamin, David ;
Atallah, Mikhail L. .
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, :240-245
[9]  
Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
[10]  
Choi SG, 2013, LECT NOTES COMPUT SC, V7785, P499, DOI 10.1007/978-3-642-36594-2_28