The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
클라우드 컴퓨팅을 사용하면 컴퓨팅 리소스가 제한된 장치에서 많은 컴퓨팅을 경제적으로 클라우드에 아웃소싱할 수 있습니다. 모듈식 지수화는 공개 키 암호화 프로토콜에서 가장 비용이 많이 드는 작업 중 하나이며 이러한 작업은 리소스가 제한된 장치에 큰 부담이 될 수 있습니다. 이전에는 신뢰할 수 없는 하나 또는 두 개의 클라우드 서버 모델을 사용하거나 상대적으로 큰 계산 오버헤드가 있거나 검사 가능성에 대한 100% 가능성을 지원하지 않는 보안 아웃소싱 모듈식 지수화에 대한 작업이 있었습니다. 이 편지에서 우리는 신뢰할 수 없는 두 클라우드 서버 모델에서 모듈식 지수화를 안전하게 아웃소싱하기 위한 효율적이고 검증 가능한 새로운 알고리즘을 제안합니다. 알고리즘은 EBPV 생성기를 기반으로 무작위 쌍을 생성하여 효율성을 향상시키며, 알고리즘은 데이터 프라이버시를 유지하면서 검사 가능성에 대해 100% 확률을 갖습니다.
Shaojing FU
National University of Defense Technology,Sate Key Laboratory of Cryptology
Yunpeng YU
National University of Defense Technology,Sate Key Laboratory of Cryptology
Ming XU
National University of Defense Technology,Sate Key Laboratory of Cryptology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Shaojing FU, Yunpeng YU, Ming XU, "A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations" in IEICE TRANSACTIONS on Fundamentals,
vol. E103-A, no. 1, pp. 221-224, January 2020, doi: 10.1587/transfun.2019CIL0002.
Abstract: Cloud computing enables computational resource-limited devices to economically outsource much computations to the cloud. Modular exponentiation is one of the most expensive operations in public key cryptographic protocols, and such operation may be a heavy burden for the resource-constraint devices. Previous works for secure outsourcing modular exponentiation which use one or two untrusted cloud server model or have a relatively large computational overhead, or do not support the 100% possibility for the checkability. In this letter, we propose a new efficient and verifiable algorithm for securely outsourcing modular exponentiation in the two untrusted cloud server model. The algorithm improves efficiency by generating random pairs based on EBPV generators, and the algorithm has 100% probability for the checkability while preserving the data privacy.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2019CIL0002/_p
부
@ARTICLE{e103-a_1_221,
author={Shaojing FU, Yunpeng YU, Ming XU, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations},
year={2020},
volume={E103-A},
number={1},
pages={221-224},
abstract={Cloud computing enables computational resource-limited devices to economically outsource much computations to the cloud. Modular exponentiation is one of the most expensive operations in public key cryptographic protocols, and such operation may be a heavy burden for the resource-constraint devices. Previous works for secure outsourcing modular exponentiation which use one or two untrusted cloud server model or have a relatively large computational overhead, or do not support the 100% possibility for the checkability. In this letter, we propose a new efficient and verifiable algorithm for securely outsourcing modular exponentiation in the two untrusted cloud server model. The algorithm improves efficiency by generating random pairs based on EBPV generators, and the algorithm has 100% probability for the checkability while preserving the data privacy.},
keywords={},
doi={10.1587/transfun.2019CIL0002},
ISSN={1745-1337},
month={January},}
부
TY - JOUR
TI - A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 221
EP - 224
AU - Shaojing FU
AU - Yunpeng YU
AU - Ming XU
PY - 2020
DO - 10.1587/transfun.2019CIL0002
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E103-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2020
AB - Cloud computing enables computational resource-limited devices to economically outsource much computations to the cloud. Modular exponentiation is one of the most expensive operations in public key cryptographic protocols, and such operation may be a heavy burden for the resource-constraint devices. Previous works for secure outsourcing modular exponentiation which use one or two untrusted cloud server model or have a relatively large computational overhead, or do not support the 100% possibility for the checkability. In this letter, we propose a new efficient and verifiable algorithm for securely outsourcing modular exponentiation in the two untrusted cloud server model. The algorithm improves efficiency by generating random pairs based on EBPV generators, and the algorithm has 100% probability for the checkability while preserving the data privacy.
ER -