Secure outsourcing of modular exponentiations in cloud and cluster computing

被引:0
作者
Jun Ye
Zheng Xu
Yong Ding
机构
[1] Sichuan University of Science & Engineering,Sichuan Province University Key Laboratory of Bridge Non
[2] The Third Research Institute of the Ministry of Public Security,destruction Detecting and Engineering Computing, Artificial Intelligence Key Laboratory of Sichuan Province
[3] Guilin University of Electronic Technology,School of Mathematics and Computing Science, Guangxi Key Laboratory of Cryptography and Information Security
来源
Cluster Computing | 2016年 / 19卷
关键词
Modular exponentiations; Outsourcing computation; Verification; Cloud computing;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing and cluster computing are user-centric computing services. The shared software and hardware resources and information can be provided to the computers and other equipments according to the demands of users. A majority of services are deployed through outsourcing. Outsourcing computation allows resource-constrained clients to outsource their complex computation workloads to a powerful server which is rich of computation resources. Modular exponentiation is one of the most complex computations in public key based cryptographic schemes. It is useful to reduce the computation cost of the clients by using outsourcing computation. In this paper, we propose a novel outsourcing algorithm for modular exponentiation based on the new mathematical division under the setting of two non-colluding cloud servers. The base and the power of the outsourced data can be kept private and the efficiency is improved compared with former works.
引用
收藏
页码:811 / 820
页数:9
相关论文
共 52 条
  • [1] Abadi M(1989)On hiding information from an oracle J. Comput. Syst. Sci. 39 21-50
  • [2] Feigenbaum J(2002)Secure outsourcing of scientific computations Adv. Comput. 54 215-272
  • [3] Kilian J(1997)Locally random reductions: Improvements and applications J. Cryptol. 10 17-36
  • [4] Atallah MJ(1991)Program result checking against adaptive programs and in cryptographic settings DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2 107-118
  • [5] Pantazopoulos KN(2014)Semantic link network-based model for organizing multimedia big data IEEE Trans. Emerg. Top. Comput. 2 376-387
  • [6] Rice JR(2014)Digital provenance: enabling secure data forensics in cloud computing Future Gener. Comput. Syst. 37 259-266
  • [7] Spafford EH(2014)Privacy-preserving data utilization in hybrid clouds Future Gener. Comput. Syst. 30 98-106
  • [8] Beaver D(2001)Distribution of modular sums and the security of the server aided exponentiation Cryptogr. Comput. Number Theory 20 331-342
  • [9] Feigenbaum J(1997)On schnorr’s preprocessing for digital signature schemes J. Cryptol. 10 1-16
  • [10] Kilian J(2011)A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1-11