2012
DOI: 10.1007/978-3-642-33167-1_31
|View full text |Cite
|
Sign up to set email alerts
|

New Algorithms for Secure Outsourcing of Modular Exponentiations

Abstract: Abstract. Modular exponentiations have been considered the most expensive operation in discrete-logarithm based cryptographic protocols. In this paper, we propose a new secure outsourcing algorithm for exponentiation modular a prime in the one-malicious model. Compared with the state-of-the-art algorithm [33], the proposed algorithm is superior in both efficiency and checkability. We then utilize this algorithm as a subroutine to achieve outsource-secure Cramer-Shoup encryptions and Schnorr signatures. Besides… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
150
0
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 140 publications
(151 citation statements)
references
References 48 publications
0
150
0
1
Order By: Relevance
“…Many algorithms have been proposed for outsourcing computation [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. They aim either to have a better outsourcing security model or to have more efficient constructions.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Many algorithms have been proposed for outsourcing computation [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. They aim either to have a better outsourcing security model or to have more efficient constructions.…”
Section: Related Workmentioning
confidence: 99%
“…At ESORICS 2012, Chen et al [2] propose a more efficient construction than Hohenberger-Lysyanskaya's algorithm, where the probability of detecting malicious behavior is improved to 2/3. However, modular exponentiations can be computed by the client with O(log 2 (l)) multiplications.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…It answered the question: Can message-locked encryption be secure for lock dependent message [19]. The tag randomization design makes the fully random scheme, R-MLE2 for short, satisfy the standard secure notion of data confidentiality.…”
mentioning
confidence: 99%