Skip to main content

2018 | OriginalPaper | Buchkapitel

An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation

verfasst von : Xiaoshuang Luo, Xiaoyuan Yang, Xiangzhou Niu

Erschienen in: Advances in Internetworking, Data & Web Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Bilinear pairing computation is one of the most important cryptographic primitives, which is widely used in the public key encryption schemes. However, it has been considered the most expensive operation in the pairing-based cryptographic protocols. In this paper, we present an efficient and secure outsourcing algorithm for bilinear maps based on one untrusted servers. The client could outsource expensive computation to the cloud and perform simple operation to obtain the great efficiency. We analyze the security of this algorithm and compare it with prior works in efficiency. It is argued that our algorithm is more efficient and practical than the state of the art.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Su, Z., Sun, C., Li, H., Ma, J.: A method for efficient parallel computation of Tate pairing. Int. J. Grid Util. Comput. 3, 43–52 (2012)CrossRef Su, Z., Sun, C., Li, H., Ma, J.: A method for efficient parallel computation of Tate pairing. Int. J. Grid Util. Comput. 3, 43–52 (2012)CrossRef
2.
Zurück zum Zitat Zhang, J., Zhang, F.: Linear threshold verifiable secret sharing in bilinear groups. Int. J. Grid Util. Comput. 4, 212–218 (2013)CrossRef Zhang, J., Zhang, F.: Linear threshold verifiable secret sharing in bilinear groups. Int. J. Grid Util. Comput. 4, 212–218 (2013)CrossRef
3.
Zurück zum Zitat Sakai, R., Ohigishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Symposium on Cryptography and Information Security, pp. 135–148 (2000) Sakai, R., Ohigishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Symposium on Cryptography and Information Security, pp. 135–148 (2000)
4.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology—CRYPTO 2001, pp. 213–229. Springer, Heidelberg (2001) Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology—CRYPTO 2001, pp. 213–229. Springer, Heidelberg (2001)
5.
Zurück zum Zitat Luo, S., Chen, Z.: Hierarchical identity-based encryption without key delegation in decryption. Int. J. Grid Util. Comput. 5, 71–79 (2014)CrossRef Luo, S., Chen, Z.: Hierarchical identity-based encryption without key delegation in decryption. Int. J. Grid Util. Comput. 5, 71–79 (2014)CrossRef
6.
Zurück zum Zitat Sun, X., Jiang, Z., Zhou, M., Wang, Y.: Versatile identity-based signatures for authentication in multi-user settings. Int. J. Grid Util. Comput. 5, 156–164 (2014)CrossRef Sun, X., Jiang, Z., Zhou, M., Wang, Y.: Versatile identity-based signatures for authentication in multi-user settings. Int. J. Grid Util. Comput. 5, 156–164 (2014)CrossRef
7.
Zurück zum Zitat Garg, S., Gentry, C., Halevi, S., Zhandry, M.: Fully secure attribute based encryption from multilinear maps. IACR Cryptology ePrint Archive 2014/622 Garg, S., Gentry, C., Halevi, S., Zhandry, M.: Fully secure attribute based encryption from multilinear maps. IACR Cryptology ePrint Archive 2014/622
8.
Zurück zum Zitat Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6, 91–97 (2015)CrossRef Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6, 91–97 (2015)CrossRef
9.
Zurück zum Zitat Wee, H.: Dual system encryption via predicate encodings. In: Theory of Cryptography Conference, pp. 616–637. Springer, Heidelberg (2014) Wee, H.: Dual system encryption via predicate encodings. In: Theory of Cryptography Conference, pp. 616–637. Springer, Heidelberg (2014)
10.
Zurück zum Zitat Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62–91. Springer, Heidelberg (2010) Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62–91. Springer, Heidelberg (2010)
11.
Zurück zum Zitat Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Heidelberg (2004) Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Heidelberg (2004)
12.
Zurück zum Zitat Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 514–532. Springer, Heidelberg (2001) Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 514–532. Springer, Heidelberg (2001)
13.
Zurück zum Zitat Guo, S., Xu, H.: A secure delegation scheme of large polynomial computation in multi–party cloud. Int. J. Grid Util. Comput. 6, 1–7 (2014)CrossRef Guo, S., Xu, H.: A secure delegation scheme of large polynomial computation in multi–party cloud. Int. J. Grid Util. Comput. 6, 1–7 (2014)CrossRef
14.
Zurück zum Zitat Manoharan, M., Selvarajan, S.: An efficient methodology to improve service negotiation in cloud environment. Int. J. Grid Util. Comput. 6, 150–158 (2015)CrossRef Manoharan, M., Selvarajan, S.: An efficient methodology to improve service negotiation in cloud environment. Int. J. Grid Util. Comput. 6, 150–158 (2015)CrossRef
15.
Zurück zum Zitat Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 50–64 (2016)CrossRef Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 50–64 (2016)CrossRef
16.
Zurück zum Zitat Yuriyama, M., Kushida, T.: Integrated cloud computing environment with IT resources and sensor devices. Int. J. Space-Based Situated Comput. 1, 163–173 (2011)CrossRef Yuriyama, M., Kushida, T.: Integrated cloud computing environment with IT resources and sensor devices. Int. J. Space-Based Situated Comput. 1, 163–173 (2011)CrossRef
17.
Zurück zum Zitat Mezghani, K., Ayadi, F.: Factors explaining IS managers attitudes toward cloud computing adoption. Int. J. Technol. Hum. Interact. (IJTHI) 12, 1–20 (2016)CrossRef Mezghani, K., Ayadi, F.: Factors explaining IS managers attitudes toward cloud computing adoption. Int. J. Technol. Hum. Interact. (IJTHI) 12, 1–20 (2016)CrossRef
18.
Zurück zum Zitat Sakurai, S.: Prediction of sales volume based on the RFID data collected from apparel shops. Int. J. Space-Based Situated Comput. 1, 174–182 (2011)CrossRef Sakurai, S.: Prediction of sales volume based on the RFID data collected from apparel shops. Int. J. Space-Based Situated Comput. 1, 174–182 (2011)CrossRef
19.
Zurück zum Zitat Varaprasad, G., Murthy, G.S., Jose, J., D’Souza, R.J.: Design and development of efficient algorithm for mobile ad hoc networks using cache. Int. J. Space-Based Situated Comput. 1, 183–188 (2011)CrossRef Varaprasad, G., Murthy, G.S., Jose, J., D’Souza, R.J.: Design and development of efficient algorithm for mobile ad hoc networks using cache. Int. J. Space-Based Situated Comput. 1, 183–188 (2011)CrossRef
20.
Zurück zum Zitat Morreale, P., Goncalves, A., Silva, C.: Mobile ad hoc network communication for disaster recovery. Int. J. Space-Based Situated Comput. 5, 178–186 (2015)CrossRef Morreale, P., Goncalves, A., Silva, C.: Mobile ad hoc network communication for disaster recovery. Int. J. Space-Based Situated Comput. 5, 178–186 (2015)CrossRef
21.
Zurück zum Zitat Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceedings of the 2nd International Conference on Theory of Cryptography, pp. 264–282. Springer, Berlin (2005) Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceedings of the 2nd International Conference on Theory of Cryptography, pp. 264–282. Springer, Berlin (2005)
22.
Zurück zum Zitat Tian, H., Zhang, F., Ren, K.: Secure bilinear pairing outsourcing made more efficient and flexible. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (2015) Tian, H., Zhang, F., Ren, K.: Secure bilinear pairing outsourcing made more efficient and flexible. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (2015)
23.
Zurück zum Zitat Girault, M., Lefranc, D.: Server-aided verification: theory and practice. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 605–623. Springer, Heidelberg (2005) Girault, M., Lefranc, D.: Server-aided verification: theory and practice. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 605–623. Springer, Heidelberg (2005)
24.
Zurück zum Zitat Chevallier-Mames, B., Coron, J.S., McCullagh, N., Naccache, D., Scott, M.: Secure delegation of elliptic-curve pairing. In: International Conference on Smart Card Research and Advanced Applications, pp. 24–35. Springer, Heidelberg (2010) Chevallier-Mames, B., Coron, J.S., McCullagh, N., Naccache, D., Scott, M.: Secure delegation of elliptic-curve pairing. In: International Conference on Smart Card Research and Advanced Applications, pp. 24–35. Springer, Heidelberg (2010)
25.
Zurück zum Zitat Canard, S., Devigne, J., Sanders, O.: Delegating a pairing can be both secure and efficient. In: International Conference on Applied Cryptography and Network Security, pp. 549–565. Springer International Publishing (2014) Canard, S., Devigne, J., Sanders, O.: Delegating a pairing can be both secure and efficient. In: International Conference on Applied Cryptography and Network Security, pp. 549–565. Springer International Publishing (2014)
26.
Zurück zum Zitat Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., Tang, Q.: Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562, 112–121 (2015)MathSciNetCrossRefMATH Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., Tang, Q.: Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562, 112–121 (2015)MathSciNetCrossRefMATH
27.
Zurück zum Zitat Arabacı, O., Kiraz, M.S., Sertkaya, I., Uzunkol, O.: More efficient secure outsourcing methods for bilinear maps (2015) Arabacı, O., Kiraz, M.S., Sertkaya, I., Uzunkol, O.: More efficient secure outsourcing methods for bilinear maps (2015)
28.
Zurück zum Zitat Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. In: Cryptography and Computational Number Theory, pp. 331–342. Birkhäuser, Basel (2001) Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. In: Cryptography and Computational Number Theory, pp. 331–342. Birkhäuser, Basel (2001)
29.
Zurück zum Zitat Goldreich, O.: The Foundation of Cryptography: Basic Applications, vol. 1, pp. 103–112. Cambridge University Press, Cambridge (2009) Goldreich, O.: The Foundation of Cryptography: Basic Applications, vol. 1, pp. 103–112. Cambridge University Press, Cambridge (2009)
30.
Zurück zum Zitat Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: European Symposium on Research in Computer Security, pp. 326–343. Springer International Publishing (2014) Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: European Symposium on Research in Computer Security, pp. 326–343. Springer International Publishing (2014)
Metadaten
Titel
An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation
verfasst von
Xiaoshuang Luo
Xiaoyuan Yang
Xiangzhou Niu
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-59463-7_33