Secure outsource computing scheme of modular exponentiation based on single server
At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-01-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018001/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530267128299520 |
---|---|
author | Weijie DING |
author_facet | Weijie DING |
author_sort | Weijie DING |
collection | DOAJ |
description | At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120. |
format | Article |
id | doaj-art-11287186653b4ceca36b1a1cac7a50e9 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2018-01-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-11287186653b4ceca36b1a1cac7a50e92025-01-15T03:05:23ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-01-0134808659597554Secure outsource computing scheme of modular exponentiation based on single serverWeijie DINGAt present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018001/cloud computingoutsource computingmodular exponentiation |
spellingShingle | Weijie DING Secure outsource computing scheme of modular exponentiation based on single server Dianxin kexue cloud computing outsource computing modular exponentiation |
title | Secure outsource computing scheme of modular exponentiation based on single server |
title_full | Secure outsource computing scheme of modular exponentiation based on single server |
title_fullStr | Secure outsource computing scheme of modular exponentiation based on single server |
title_full_unstemmed | Secure outsource computing scheme of modular exponentiation based on single server |
title_short | Secure outsource computing scheme of modular exponentiation based on single server |
title_sort | secure outsource computing scheme of modular exponentiation based on single server |
topic | cloud computing outsource computing modular exponentiation |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018001/ |
work_keys_str_mv | AT weijieding secureoutsourcecomputingschemeofmodularexponentiationbasedonsingleserver |