Deakin University
Browse

File(s) under permanent embargo

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server

Version 2 2024-06-06, 00:17
Version 1 2018-07-16, 13:31
journal contribution
posted on 2024-06-06, 00:17 authored by A Fu, S Li, S Yu, Y Zhang, Y Sun
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers, which is more economical for cloud customers. However, since users lose direct control of the computation task, possible threats need to be addressed, such as data privacy and the correctness of results. Modular exponentiation is one of the most basic and time-consuming operations but widely applied in the field of cryptography. In this paper, we propose two new and efficient algorithms for secure outsourcing of single and multiple composite modular exponentiations. Unlike the algorithms based on two untrusted servers, we outsource modular exponentiation operation to only a single server, eliminating the possible collusion attack with two servers. Moreover, we put forward a new mathematical division method, which hides the base and exponent of the outsourced data, without exposing sensitive information to the cloud server. In addition, compared with other state-of-the-art algorithms, our scheme shows a remarkable improvement in checkability, enabling the user to detect any misbehavior with the optimal probability close to 1. Finally, we use our proposed algorithms as a subroutine to realize Shamir's Identity-Based Signature Scheme and Identity-Based Multi-Signatures Scheme.

History

Journal

Journal of network and computer applications

Volume

118

Pagination

102-112

Location

Amsterdam, The Netherlands

ISSN

1084-8045

eISSN

1095-8592

Language

eng

Publication classification

C Journal article, C1 Refereed article in a scholarly journal

Copyright notice

2018, Elsevier Ltd.

Publisher

Elsevier