Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2018

01-12-2018

Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations

Authors: E. B. Aleksandrova, E. N. Shkorkina

Published in: Automatic Control and Computer Sciences | Issue 8/2018

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

When carrying out outsourced cryptographic computations, it is possible not only to have errors in server computations but also to interact with a malicious computing server. In this paper, we propose an undeniable signature protocol adapted for a group of points of elliptic curve. We also present an outsourced algorithm for elliptic curve point multiplication.
Literature
1.
go back to reference Ch, R., Rao, K.V., and Vasumathi, D., Identity-based cryptosystem based on tate pairing, Global J. Comput. Sci. Technol., 2016, vol. 16, no. 5. Ch, R., Rao, K.V., and Vasumathi, D., Identity-based cryptosystem based on tate pairing, Global J. Comput. Sci. Technol., 2016, vol. 16, no. 5.
2.
go back to reference Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., and Tang, Q., Efficient algorithms for secure outsourcing of bilinear pairings, Theor. Comput. Sci., 2015, vol. 562, pp. 112–121.MathSciNetCrossRefMATH Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., and Tang, Q., Efficient algorithms for secure outsourcing of bilinear pairings, Theor. Comput. Sci., 2015, vol. 562, pp. 112–121.MathSciNetCrossRefMATH
3.
go back to reference Tian, H., Zhang, F., and Ren, K., Secure bilinear pairing outsourcing made more efficient and flexible, ASIA CCS’15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015, pp. 417–426. Tian, H., Zhang, F., and Ren, K., Secure bilinear pairing outsourcing made more efficient and flexible, ASIA CCS’15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015, pp. 417–426.
4.
go back to reference Arabaci, O., Kiraz, M.S., Sertkaya, I., and Uzunkol, O., More efficient secure outsourcing methods for bilinear maps, Cryptol. ePrint Arch., 2016, no. 960. Arabaci, O., Kiraz, M.S., Sertkaya, I., and Uzunkol, O., More efficient secure outsourcing methods for bilinear maps, Cryptol. ePrint Arch., 2016, no. 960.
5.
go back to reference Ren, Y., Dong, M., Niu, Z., and Du, X., Noninteractive verifiable outsourcing algorithm for bilinear pairing with improved checkability, Secur. Commun. Networks, 2017, vol. 2017. Ren, Y., Dong, M., Niu, Z., and Du, X., Noninteractive verifiable outsourcing algorithm for bilinear pairing with improved checkability, Secur. Commun. Networks, 2017, vol. 2017.
6.
go back to reference Chaum, D. and Van Antwerpen, H., Undeniable signatures, Conference on the Theory and Application of Cryptology, New York, 1989, pp. 212–216. Chaum, D. and Van Antwerpen, H., Undeniable signatures, Conference on the Theory and Application of Cryptology, New York, 1989, pp. 212–216.
7.
go back to reference Jao, D. and Soukharev, V., Isogeny-based quantum-resistant undeniable signatures, International Workshop on Post-Quantum Cryptography, Cham, 2014, pp. 160–179. Jao, D. and Soukharev, V., Isogeny-based quantum-resistant undeniable signatures, International Workshop on Post-Quantum Cryptography, Cham, 2014, pp. 160–179.
8.
go back to reference Lin, X.J., Sun, L., Qu, H., and Zhang, X., New approaches for secure outsourcing algorithm for modular exponentiations, Cryptol. ePrint Arch., 2016, no. 45. Lin, X.J., Sun, L., Qu, H., and Zhang, X., New approaches for secure outsourcing algorithm for modular exponentiations, Cryptol. ePrint Arch., 2016, no. 45.
9.
go back to reference Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Elliptic curves generation for isogeny-based cryptosystems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 928–935.CrossRef Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Elliptic curves generation for isogeny-based cryptosystems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 928–935.CrossRef
Metadata
Title
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations
Authors
E. B. Aleksandrova
E. N. Shkorkina
Publication date
01-12-2018
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2018
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080023

Other articles of this Issue 8/2018

Automatic Control and Computer Sciences 8/2018 Go to the issue