Telecommunications Science ›› 2018, Vol. 34 ›› Issue (1): 80-86.doi: 10.11959/j.issn.1000-0801.2018001

• research and development • Previous Articles     Next Articles

Secure outsource computing scheme of modular exponentiation based on single server

Weijie DING1,2   

  1. 1 Department of Computer and Information Technology,Zhejiang Police College,Hangzhou 310053,China
    2 College of Information and Engineering,Zhejiang University of Technology,Hangzhou 310023,China
  • Revised:2017-07-31 Online:2018-01-01 Published:2018-02-05
  • Supported by:
    The National Natural Science Foundation of China(U1509219)

Abstract:

At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.

Key words: cloud computing, outsource computing, modular exponentiation

CLC Number: 

No Suggested Reading articles found!