Skip to main content
Top

2021 | OriginalPaper | Chapter

Secure and Efficient Delegation of Pairings with Online Inputs

Authors : Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain

Published in: Smart Card Research and Advanced Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Delegation of pairings from a computationally weaker client to a computationally stronger server has been advocated to expand the applicability of pairing-based cryptographic protocols to computation paradigms with resource-constrained devices. Important requirements for such delegation protocols include privacy of the client’s inputs and security of the client’s output, in the sense of detecting, with high probability, any malicious server’s attempt to convince the client of an incorrect pairing result. In this paper we show that pairings with inputs only available in the online phase can be efficiently, privately and securely delegated to a single, possibly malicious, server. We present new protocols in 2 different scenarios: (1) the two pairing inputs are publicly known; (2) privacy of both pairing inputs needs to be maintained (left open in previous papers; e.g., [27]). In both cases, we improve the online-phase client’s runtime with respect to previous work. In the latter case, we show the first protocol where the client’s online-phase runtime is faster than non-delegated computation for all of the most practical known curves. In previous work, the client’s runtime was worse, especially for one of the most practical elliptic curves underlying the pairing function (i.e., BN-12).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (eds.) Advances in Cryptology - ASIACRYPT (2003) Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (eds.) Advances in Cryptology - ASIACRYPT (2003)
3.
go back to reference Barreto, P.S.L.M., Costello, C., Misoczki, R., Naehrig, M., Pereira, G.C.C.F., Zanon, G.: Subgroup security in pairing-based cryptography. In: Lauter, K., Rodríguez-Henríquez, F. (eds.) Progress in Cryptology - LATINCRYPT (2015) Barreto, P.S.L.M., Costello, C., Misoczki, R., Naehrig, M., Pereira, G.C.C.F., Zanon, G.: Subgroup security in pairing-based cryptography. In: Lauter, K., Rodríguez-Henríquez, F. (eds.) Progress in Cryptology - LATINCRYPT (2015)
11.
12.
go back to reference Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Practical and secure outsourcing of discrete log group exponentiation to a single malicious server. In: Proceedings of 9th ACM CCSW, pp. 17–28 (2017) Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Practical and secure outsourcing of discrete log group exponentiation to a single malicious server. In: Proceedings of 9th ACM CCSW, pp. 17–28 (2017)
21.
go back to reference Kang, B.G., Lee, M.S., Park, J.H.: Efficient delegation of pairing computation. In: IACR Cryptology ePrint Archive, vol. 259 (2005) Kang, B.G., Lee, M.S., Park, J.H.: Efficient delegation of pairing computation. In: IACR Cryptology ePrint Archive, vol. 259 (2005)
23.
go back to reference Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings ACM Symposium on Information, Computer and Communications Security. ACM Press (2007) Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings ACM Symposium on Information, Computer and Communications Security. ACM Press (2007)
24.
go back to reference Markantonakis, C.: Is the performance of smart card cryptographic functions the real bottleneck? In: Proceedings of IFIP/SEC, pp. 77–92 (2001) Markantonakis, C.: Is the performance of smart card cryptographic functions the real bottleneck? In: Proceedings of IFIP/SEC, pp. 77–92 (2001)
25.
go back to reference Scott, M.: Unbalancing pairing-based key exchange protocols. In: IACR Cryptology ePrint Archive, vol. 688 (2013) Scott, M.: Unbalancing pairing-based key exchange protocols. In: IACR Cryptology ePrint Archive, vol. 688 (2013)
27.
go back to reference Vergnaud, D.: Secure outsourcing in discrete-logarithm-based and pairing-based cryptography. In: Proceedings of WISTP, pp. 7–11 (2018) Vergnaud, D.: Secure outsourcing in discrete-logarithm-based and pairing-based cryptography. In: Proceedings of WISTP, pp. 7–11 (2018)
28.
go back to reference Yao, A.: Protocols for secure computations. In: Proceedings of 23rd IEEE FOCS, pp. 160–168 (1982) Yao, A.: Protocols for secure computations. In: Proceedings of 23rd IEEE FOCS, pp. 160–168 (1982)
Metadata
Title
Secure and Efficient Delegation of Pairings with Online Inputs
Authors
Giovanni Di Crescenzo
Matluba Khodjaeva
Delaram Kahrobaei
Vladimir Shpilrain
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-68487-7_6

Premium Partner