Skip to main content
Top
Published in: Cluster Computing 4/2018

25-07-2018

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server

Authors: Anmin Fu, Yiming Zhu, Guomin Yang, Shui Yu, Yan Yu

Published in: Cluster Computing | Issue 4/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Modular exponentiation is an expensive discrete-logarithm operation, difficult for resource-constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing, users are willing to securely outsourcing modular exponentiations to cloud servers to reduce computation overhead. In this paper, we contrive a fully verifiable secure outsourcing scheme for modular exponentiation with only a single server, named MExp. MExp not only prevents users’ private information leakage during outsourcing by our new logical division method, but also eliminates collusion attacks occurring in algorithms with two untrusted servers. Moreover, our MExp allows outsourcers to detect any misbehavior with a probability of 1, which shows significant improvement in checkability when compare to other single-server-based schemes. With a view to reducing computation overhead, MExp is extended to multiple modular exponentiations, named M2Exp. The algorithm significantly diminishes the local costs of multiple modular exponentiation calculations and the checkability is still 1. Compared with existing state-of-the-art schemes, MExp and M2Exp have outstanding performance in both efficiency and checkability. Finally, MExp and M2Exp are applied to Cramer–Shoup encryptions and Schnorr signatures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)CrossRef Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)CrossRef
2.
go back to reference Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4(6), 2751–2763 (2016)CrossRef Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4(6), 2751–2763 (2016)CrossRef
3.
go back to reference Gani, A., Siddiqa, A., Shamshirband, S., et al.: A survey on indexing techniques for big data: taxonomy and performance evaluation. Knowl. Inf. Syst. 46(2), 241–284 (2016)CrossRef Gani, A., Siddiqa, A., Shamshirband, S., et al.: A survey on indexing techniques for big data: taxonomy and performance evaluation. Knowl. Inf. Syst. 46(2), 241–284 (2016)CrossRef
4.
go back to reference Naranjo, P.G.V., Baccarelli, E., Scarpiniti, M.: Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications. J. Supercomput. 74, 1–38 (2018)CrossRef Naranjo, P.G.V., Baccarelli, E., Scarpiniti, M.: Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications. J. Supercomput. 74, 1–38 (2018)CrossRef
5.
go back to reference Pooranian Z. et al.: RARE: defeating side channels based on data-deduplication in cloud storage. In: Proceeding of the INFOCOM CCSNA, pp. 1–6 (2018) Pooranian Z. et al.: RARE: defeating side channels based on data-deduplication in cloud storage. In: Proceeding of the INFOCOM CCSNA, pp. 1–6 (2018)
6.
go back to reference Khan, A.N., Kiah, M.L.M., Ali, M., et al.: A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13(4), 651–675 (2015)CrossRef Khan, A.N., Kiah, M.L.M., Ali, M., et al.: A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13(4), 651–675 (2015)CrossRef
7.
go back to reference Jan, B., Khan, F.G., Montrucchio, B., et al.: Introducing ToPe-FFT: an OpenCL-based FFT library targeting GPUs. Concurr. Comput. 29(21), 4256 (2017)CrossRef Jan, B., Khan, F.G., Montrucchio, B., et al.: Introducing ToPe-FFT: an OpenCL-based FFT library targeting GPUs. Concurr. Comput. 29(21), 4256 (2017)CrossRef
8.
go back to reference Javanmardi, S., Shojafar, M., Shariatmadari, S., et al.: Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int. J. Grid Util. Comput. 6(1), 57–66 (2014)CrossRef Javanmardi, S., Shojafar, M., Shariatmadari, S., et al.: Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int. J. Grid Util. Comput. 6(1), 57–66 (2014)CrossRef
9.
go back to reference Javanmardi, S., Shojafar, M., Amendola, D. et al.: Hybrid job scheduling algorithm for cloud computing environment. InL Proceeding of the IBICA, pp. 43–52 (2014) Javanmardi, S., Shojafar, M., Amendola, D. et al.: Hybrid job scheduling algorithm for cloud computing environment. InL Proceeding of the IBICA, pp. 43–52 (2014)
10.
go back to reference Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Proceeding of the CRYPTO, pp. 89–105 (1992) Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Proceeding of the CRYPTO, pp. 89–105 (1992)
11.
go back to reference Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceeding of the TCC, pp. 264–282 (2005)CrossRef Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceeding of the TCC, pp. 264–282 (2005)CrossRef
13.
go back to reference Huang, L., Zhang, G., Fu, A.: Privacy-preserving public auditing for non-manager group. In: Proceeding of the IEEE ICC, pp. 1–6 (2017) Huang, L., Zhang, G., Fu, A.: Privacy-preserving public auditing for non-manager group. In: Proceeding of the IEEE ICC, pp. 1–6 (2017)
14.
go back to reference Fu, A., Li, Y., Yu, S., Yu, Y., Zhang, G.: DIPOR: an IDA-based dynamic proof of retrievability scheme for cloud storage systems. J. Netw Comput. Appl. 104, 97–106 (2018)CrossRef Fu, A., Li, Y., Yu, S., Yu, Y., Zhang, G.: DIPOR: an IDA-based dynamic proof of retrievability scheme for cloud storage systems. J. Netw Comput. Appl. 104, 97–106 (2018)CrossRef
15.
go back to reference Yu, Y., Luo, Y., Wang, D. et al.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In Proceeding of the IEEE ICC, pp. 1–6 (2016) Yu, Y., Luo, Y., Wang, D. et al.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In Proceeding of the IEEE ICC, pp. 1–6 (2016)
16.
go back to reference Chen, X., Li, J., Ma, J., et al.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)CrossRef Chen, X., Li, J., Ma, J., et al.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)CrossRef
17.
go back to reference Ye, J., Chen, X., Ma. J.: An improved algorithm for secure outsourcing of modular exponentiations. In: Proceeding of the IEEE AINA, pp. 73–76 (2015) Ye, J., Chen, X., Ma. J.: An improved algorithm for secure outsourcing of modular exponentiations. In: Proceeding of the IEEE AINA, pp. 73–76 (2015)
18.
go back to reference Ren, Y., Ding, N., Zhang, X. et al.: Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: Proceeding of the ACM ASIACCS, pp. 293–303 (2016) Ren, Y., Ding, N., Zhang, X. et al.: Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: Proceeding of the ACM ASIACCS, pp. 293–303 (2016)
19.
go back to reference Kuppusamy, L., Rangasamy, J.: CRT-based outsourcing algorithms for modular exponentiations. In: Proceeding of the INDOCRYPT, pp. 81–98 (2016)CrossRef Kuppusamy, L., Rangasamy, J.: CRT-based outsourcing algorithms for modular exponentiations. In: Proceeding of the INDOCRYPT, pp. 81–98 (2016)CrossRef
20.
go back to reference Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)CrossRef Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)CrossRef
21.
go back to reference Dijk, M.V., Clarke, D., Gassend, B., et al.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Crypt. 39(2), 253–273 (2006)MathSciNetCrossRef Dijk, M.V., Clarke, D., Gassend, B., et al.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Crypt. 39(2), 253–273 (2006)MathSciNetCrossRef
22.
go back to reference Wang, Y., Wu, Q., Wong, D.S. et al.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Proceeding of the ESORICS, pp. 326–343 (2014) Wang, Y., Wu, Q., Wong, D.S. et al.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Proceeding of the ESORICS, pp. 326–343 (2014)
23.
go back to reference Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. In: Proceeding of the ESORICS, pp. 261–278 (2016)CrossRef Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. In: Proceeding of the ESORICS, pp. 261–278 (2016)CrossRef
24.
go back to reference Xiang, C., Tang, C.: Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. J. Ambient Intell. Human. Comput. 6(1), 131–139 (2015)CrossRef Xiang, C., Tang, C.: Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. J. Ambient Intell. Human. Comput. 6(1), 131–139 (2015)CrossRef
25.
go back to reference Ding, Y., Xu, Z., Ye, J., et al.: Secure outsourcing of modular exponentiations under single untrusted programme model. J. Comput. Syst. Sci. 90, 1–13 (2016)MathSciNetCrossRef Ding, Y., Xu, Z., Ye, J., et al.: Secure outsourcing of modular exponentiations under single untrusted programme model. J. Comput. Syst. Sci. 90, 1–13 (2016)MathSciNetCrossRef
26.
go back to reference Kiraz, M.S., Uzunkol, O.: Efficient and Verifiable algorithms for secure outsourcing of cryptographic computations. Int. J. Inf. Secur. 15(5), 519–537 (2016)CrossRef Kiraz, M.S., Uzunkol, O.: Efficient and Verifiable algorithms for secure outsourcing of cryptographic computations. Int. J. Inf. Secur. 15(5), 519–537 (2016)CrossRef
27.
go back to reference Li, S., Huang, L., Fu, A., et al.: CEXP: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server. Digital Commun. Netw. 3(4), 236–241 (2017)CrossRef Li, S., Huang, L., Fu, A., et al.: CEXP: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server. Digital Commun. Netw. 3(4), 236–241 (2017)CrossRef
28.
go back to reference Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Clust. Comput. 16(4), 787–796 (2013)CrossRef Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Clust. Comput. 16(4), 787–796 (2013)CrossRef
29.
go back to reference Li, J., Guan, Z., Du, X. et al.: An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing. In: Proceeding of the IEEE ICC, pp. 1–6 (2017) Li, J., Guan, Z., Du, X. et al.: An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing. In: Proceeding of the IEEE ICC, pp. 1–6 (2017)
30.
go back to reference Chen, X., Huang, X., Li, J., et al.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2015)CrossRef Chen, X., Huang, X., Li, J., et al.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2015)CrossRef
31.
go back to reference Li, J., Huang, X., Li, J., et al.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)CrossRef Li, J., Huang, X., Li, J., et al.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)CrossRef
32.
go back to reference Wang, J., Hu, S., Wang, Q., et al.: Privacy-preserving outsourced feature extractions in the cloud: a survey. IEEE Netw. 31(5), 36–41 (2017)MathSciNetCrossRef Wang, J., Hu, S., Wang, Q., et al.: Privacy-preserving outsourced feature extractions in the cloud: a survey. IEEE Netw. 31(5), 36–41 (2017)MathSciNetCrossRef
33.
go back to reference Xu, G., Amariucai, G.T., Guan, Y.: Delegation of computation with verification outsourcing: curious verifiers. IEEE Trans. Parallel Distrib. Syst. 28(3), 717–730 (2017)CrossRef Xu, G., Amariucai, G.T., Guan, Y.: Delegation of computation with verification outsourcing: curious verifiers. IEEE Trans. Parallel Distrib. Syst. 28(3), 717–730 (2017)CrossRef
34.
go back to reference Zhou, L., Zhu, Y., Choo, K.K.R.: Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gener. Comput. Syst. 81, 404–413 (2017)CrossRef Zhou, L., Zhu, Y., Choo, K.K.R.: Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gener. Comput. Syst. 81, 404–413 (2017)CrossRef
35.
go back to reference Lei, X., Liao, X., Ma, X., et al.: Securely and efficiently perform large matrix rank decomposition computation via cloud computing. Clust. Comput. 18(2), 989–997 (2015)CrossRef Lei, X., Liao, X., Ma, X., et al.: Securely and efficiently perform large matrix rank decomposition computation via cloud computing. Clust. Comput. 18(2), 989–997 (2015)CrossRef
37.
go back to reference Liu, X., Deng, R.H., Choo, K.K.R., et al.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 8(5), 2401–2414 (2016)CrossRef Liu, X., Deng, R.H., Choo, K.K.R., et al.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 8(5), 2401–2414 (2016)CrossRef
39.
40.
go back to reference Elgamal, T.: A publi-key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRef Elgamal, T.: A publi-key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRef
41.
go back to reference Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Proceeding of the CRYPTO, pp. 13–25 (1998)CrossRef Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Proceeding of the CRYPTO, pp. 13–25 (1998)CrossRef
42.
go back to reference Ford, W., Baum, M.S.: Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Prentice-Hall, Upper Saddle River (2000) Ford, W., Baum, M.S.: Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Prentice-Hall, Upper Saddle River (2000)
43.
go back to reference Wang, H., Xu, M., Guo, X.: Cryptanalysis and improvement of several certificateless digital signature schemes. J. Commun. 29(5), 306–309 (2008) Wang, H., Xu, M., Guo, X.: Cryptanalysis and improvement of several certificateless digital signature schemes. J. Commun. 29(5), 306–309 (2008)
44.
go back to reference Schnorr, C.P.: Efficient identification and signatures for smart cards. Proc. CRYPTO 435, 239–252 (1989)MathSciNet Schnorr, C.P.: Efficient identification and signatures for smart cards. Proc. CRYPTO 435, 239–252 (1989)MathSciNet
Metadata
Title
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server
Authors
Anmin Fu
Yiming Zhu
Guomin Yang
Shui Yu
Yan Yu
Publication date
25-07-2018
Publisher
Springer US
Published in
Cluster Computing / Issue 4/2018
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2830-7

Other articles of this Issue 4/2018

Cluster Computing 4/2018 Go to the issue

Premium Partner