Batch Public Key Cryptosystem with batch multi-exponentiation

被引:3
作者
Wu, Qianhong [1 ,5 ,7 ]
Sun, Yang [1 ]
Qin, Bo [2 ]
Hu, Jiankun [3 ]
Liu, Weiran [1 ]
Liu, Jianwei [1 ]
Ding, Yong [4 ,6 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Renmin Univ China, Sch Informat, Key Lab Data Engn & Knowledge Engn, Minist Educ, Beijing, Peoples R China
[3] Univ New S Wales, Sch Engn & IT, Sydney, NSW 2052, Australia
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Sch Math & Comp Sci, Guilin, Guangxi, Peoples R China
[5] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[6] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[7] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2016年 / 62卷
基金
北京市自然科学基金;
关键词
Modular exponentiation; Batch multi-exponentiation; Batch encryption; Batch decryption; Cramer-Shoup cryptosystem; Cloud security; MODULAR EXPONENTIATION; VERIFICATION; MULTIPLICATION; ALGORITHMS; SIGNATURES;
D O I
10.1016/j.future.2015.12.009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A Public Key Cryptosystem (PKC) is a fundamental tool to protect data security. Most PKC schemes involve complicated operations, e.g., modular exponentiations, which are expensive for cloud environment where enormous data are collected from capability-limited devices, e.g., wireless sensors, mobile phones and tablets. To address this problem, this paper investigate how to reduce the laborious computations of a large number of exponentiations in public key encryption and decryption systems. Firstly, we propose algorithms to speed up batch multi-exponentiation in different configurations. Our algorithms improve the existing multi-exponentiation and batch single-base exponentiations by allowing a large number of multi-base exponentiations to be processed in batch. Secondly, we build a batch PKC scheme from the famous Cramer-Shoup cryptosystem by allowing batch encryption and batch decryption. For batch encryption, we exploit our proposed batch multi-exponentiation approach so that multiple messages can be encrypted in batch to reduce the computation overhead; and for batch decryption, we further incorporate techniques derived from batch signature verification so that the received ciphertexts can be decrypted in batch. We conduct thorough theoretical and experimental performance analysis of the proposed batch cryptosystem. The analyses show that the batch multi-exponentiation algorithms greatly accelerate calculation speed of the Cramer-Shoup system, compared with the naive implementations with existing multi-exponentiation approaches, by more than 40% in encryption and 80% in decryption. We also provide optimal batch size configurations in the case that some ciphertexts are erroneous. This work will help make PKC towards practical applications in the cloud environment. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:196 / 204
页数:9
相关论文
共 47 条
[31]   Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage [J].
Ren Zhengwei ;
Wang Lina ;
Wu Qianhong ;
Deng Ruyi .
CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) :297-301
[32]   A Lightweight Authentication with Dynamic Batch-Based Group Key Management Using LSTM in VANET [J].
Shen, Xieyang ;
Huang, Chuanhe ;
Pu, Wenxin ;
Wang, Danxin .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[33]   Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers [J].
Tsujii, Shigeo ;
Tadaki, Kohtaro ;
Fujita, Ryo ;
Gotaishi, Masahito .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) :66-72
[34]   Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing [J].
Zhao, Jining ;
Xu, Chunxiang ;
Chen, Kefei .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02) :1043-1063
[35]   On-line Batch Process Monitoring with Improved Multi-way Independent Component Analysis [J].
Guo Hui ;
Li Hongguang .
CHINESE JOURNAL OF CHEMICAL ENGINEERING, 2013, 21 (03) :263-270
[36]   Human resource allocation or recommendation based on multi-factor criteria in on-demand and batch scenarios [J].
Arias, Michael ;
Munoz-Gama, Jorge ;
Sepulveda, Marcos ;
Carlos Miranda, Juan .
EUROPEAN JOURNAL OF INDUSTRIAL ENGINEERING, 2018, 12 (03) :364-404
[37]   Optimal Design of Multi-product Batch Plants Using a Parallel Branch-and-Bound Method [J].
Borisenko, Andrey ;
Kegel, Philipp ;
Gorlatch, Sergei .
PARALLEL COMPUTING TECHNOLOGIES, 2011, 6873 :417-+
[38]   Multi-objective particle swarm optimization (MOPSO) of lipid accumulation in Fed-batch cultures [J].
Robles-Rodriguez, C. E. ;
Bideaux, C. ;
Guillouet, S. E. ;
Gorret, N. ;
Roux, G. ;
Molina-Jouve, C. ;
Aceves-Lara, C. A. .
2016 24TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2016, :979-984
[39]   Efficient hardware realization and high radix implementation of modular multi exponential techniques for public key cryptography [J].
Tiwari, Utkarsh ;
Vollala, Satyanarayana ;
Ramasubramanian, N. ;
Begum, B. Shameedha .
MICROELECTRONICS JOURNAL, 2022, 128
[40]   A computational framework for integrating campaign scheduling, dynamic optimization and optimal control in multi-unit batch processes [J].
Rossi, Francesco ;
Casas-Orozco, Daniel ;
Reklaitis, Gintaras ;
Manenti, Flavio ;
Buzzi-Ferraris, Guido .
COMPUTERS & CHEMICAL ENGINEERING, 2017, 107 :184-220