2020
DOI: 10.1007/s00453-020-00750-2
|View full text |Cite
|
Sign up to set email alerts
|

Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

Abstract: We address the problem of speeding up group computations in cryptography using a single untrusted computational resource. We analyze the security of two efficient protocols for securely outsourcing (multi-)exponentiations. We show that the schemes do not achieve the claimed security guarantees and we present practical polynomial-time attacks on the delegation protocols which allow the untrusted helper to recover part (or the whole) of the device's secret inputs. We then provide simple constructions for outsour… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…To reduce the number of point additions, all possible values for w-bit pairs should be pre-computed and stored in Step 1 of Algorithm Shamir's trick in Figure 1. Certainly, the wide scanning approach [20][21][22][23][24][25], including the m-ary method and the sliding window method, always combines with the coding approach, such as the NAF representation and the JSF representation, in practice. However, the approach requires a large number of extra registers to store all possible values for w-bit pairs, even with a moderate w. Finally, some works [26,27] are dedicated to presenting the parallel algorithms for the multi-scalar multiplication, because the chip manufacturers are increasing the number of cores inside the processors.…”
Section: Previous Workmentioning
confidence: 99%
“…To reduce the number of point additions, all possible values for w-bit pairs should be pre-computed and stored in Step 1 of Algorithm Shamir's trick in Figure 1. Certainly, the wide scanning approach [20][21][22][23][24][25], including the m-ary method and the sliding window method, always combines with the coding approach, such as the NAF representation and the JSF representation, in practice. However, the approach requires a large number of extra registers to store all possible values for w-bit pairs, even with a moderate w. Finally, some works [26,27] are dedicated to presenting the parallel algorithms for the multi-scalar multiplication, because the chip manufacturers are increasing the number of cores inside the processors.…”
Section: Previous Workmentioning
confidence: 99%