Secure outsource computing scheme of modular exponentiation based on single server

At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not...

Full description

Saved in:
Bibliographic Details
Main Author: Weijie DING
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2018-01-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018001/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530267128299520
author Weijie DING
author_facet Weijie DING
author_sort Weijie DING
collection DOAJ
description At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.
format Article
id doaj-art-11287186653b4ceca36b1a1cac7a50e9
institution Kabale University
issn 1000-0801
language zho
publishDate 2018-01-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-11287186653b4ceca36b1a1cac7a50e92025-01-15T03:05:23ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-01-0134808659597554Secure outsource computing scheme of modular exponentiation based on single serverWeijie DINGAt present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018001/cloud computingoutsource computingmodular exponentiation
spellingShingle Weijie DING
Secure outsource computing scheme of modular exponentiation based on single server
Dianxin kexue
cloud computing
outsource computing
modular exponentiation
title Secure outsource computing scheme of modular exponentiation based on single server
title_full Secure outsource computing scheme of modular exponentiation based on single server
title_fullStr Secure outsource computing scheme of modular exponentiation based on single server
title_full_unstemmed Secure outsource computing scheme of modular exponentiation based on single server
title_short Secure outsource computing scheme of modular exponentiation based on single server
title_sort secure outsource computing scheme of modular exponentiation based on single server
topic cloud computing
outsource computing
modular exponentiation
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018001/
work_keys_str_mv AT weijieding secureoutsourcecomputingschemeofmodularexponentiationbasedonsingleserver