Skip to main content

2020 | OriginalPaper | Buchkapitel

Secure and Efficient Delegation of Elliptic-Curve Pairing

verfasst von : Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain

Erschienen in: Applied Cryptography and Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many public-key cryptosystems and, more generally, cryptographic protocols, use pairings as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client delegates such primitive operations to a computationally stronger server. Important requirements for such delegation protocols include privacy of the client’s pairing inputs and security of the client’s output, in the sense of detecting, except for very small probability, any malicious server’s attempt to convince the client of an incorrect pairing result.
In this paper we show that the computation of bilinear pairings in essentially all known pairing-based cryptographic protocols can be efficiently, privately and securely delegated to a single, possibly malicious, server. Our techniques provides efficiency improvements over past work in all input scenarios, regardless on whether inputs are available to the parties in an offline phase or only in the online phase, and on whether they are public or have privacy requirements. The client’s online runtime improvement is, for some of our protocols, almost 1 order of magnitude, no matter which practical elliptic curve, among recently recommended ones, is used for the pairing realization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Asokan, N., Tsudik, G., Waidner, M.: Server-supported signatures. J. Comput. Secur. 5(1), 91–108 (1997)CrossRef Asokan, N., Tsudik, G., Waidner, M.: Server-supported signatures. J. Comput. Secur. 5(1), 91–108 (1997)CrossRef
3.
Zurück zum Zitat Atallah, M., Pantazopoulos, K., Rice, J., Spafford, E.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef Atallah, M., Pantazopoulos, K., Rice, J., Spafford, E.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef
4.
Zurück zum Zitat Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: Proceedings of 5th ACM ASIACCS, pp. 48–59 (2010) Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: Proceedings of 5th ACM ASIACCS, pp. 48–59 (2010)
6.
Zurück zum Zitat Benjamin, D., Atallah, M.: Private and cheating-free outsourcing of algebraic computations. In: 6th Sixth Annual Conference on Privacy, Security and Trust, pp. 240–245 (2008) Benjamin, D., Atallah, M.: Private and cheating-free outsourcing of algebraic computations. In: 6th Sixth Annual Conference on Privacy, Security and Trust, pp. 240–245 (2008)
13.
Zurück zum Zitat Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)CrossRef Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)CrossRef
16.
Zurück zum Zitat Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 261–278. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45744-4_13CrossRef Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 261–278. Springer, Cham (2016). https://​doi.​org/​10.​1007/​978-3-319-45744-4_​13CrossRef
18.
Zurück zum Zitat Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Practical and secure outsourcing of discrete log group exponentiation to a single malicious server. In: Proceedings of 9th ACM CCSW, pp. 17–28 (2017) Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Practical and secure outsourcing of discrete log group exponentiation to a single malicious server. In: Proceedings of 9th ACM CCSW, pp. 17–28 (2017)
19.
Zurück zum Zitat Di Crescenzo, G., Kahrobaei, D., Khodjaeva, M., Shpilrain, V.: Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups. In: Davenport, J.H., Kauers, M., Labahn, G., Urban, J. (eds.) ICMS 2018. LNCS, vol. 10931, pp. 137–146. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96418-8_17CrossRef Di Crescenzo, G., Kahrobaei, D., Khodjaeva, M., Shpilrain, V.: Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups. In: Davenport, J.H., Kauers, M., Labahn, G., Urban, J. (eds.) ICMS 2018. LNCS, vol. 10931, pp. 137–146. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-96418-8_​17CrossRef
20.
Zurück zum Zitat Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Secure delegation to a single malicious server: exponentiation in RSA-type groups. In: Proceedings of IEEE CNS, pp. 1–9 (2019) Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Secure delegation to a single malicious server: exponentiation in RSA-type groups. In: Proceedings of IEEE CNS, pp. 1–9 (2019)
21.
Zurück zum Zitat Dijk, M., Clarke, D., Gassend, B., Suh, G., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Crypt. 39(2), 253–273 (2006)MathSciNetCrossRef Dijk, M., Clarke, D., Gassend, B., Suh, G., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Crypt. 39(2), 253–273 (2006)MathSciNetCrossRef
22.
Zurück zum Zitat Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Proceedings of ACM CCS Conference, pp. 501–512 (2012) Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Proceedings of ACM CCS Conference, pp. 501–512 (2012)
25.
Zurück zum Zitat Goldwasser, S., Tauman Kalai, Y., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. J. ACM (JACM) 62(4), 1–64 (2015)MathSciNetCrossRef Goldwasser, S., Tauman Kalai, Y., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. J. ACM (JACM) 62(4), 1–64 (2015)MathSciNetCrossRef
31.
Zurück zum Zitat Kang, B.G., Lee, M.S., Park, J.H.: Efficient delegation of pairing computation. In: IACR Cryptology ePrint Archive, no. 259 (2005) Kang, B.G., Lee, M.S., Park, J.H.: Efficient delegation of pairing computation. In: IACR Cryptology ePrint Archive, no. 259 (2005)
32.
Zurück zum Zitat Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security. ACM Press (2007) Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security. ACM Press (2007)
33.
Zurück zum Zitat Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Comput. 16, 787–796 (2013). (also INCoS 2012) Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Comput. 16, 787–796 (2013). (also INCoS 2012)
34.
Zurück zum Zitat Matsumoto, T., Kato, K., Imai, H.: An improved algorithm for secure outsourcing of modular exponentiations. In: Proceedings of CRYPTO 1988, pp. 497–506. LNCS, Springer, Cham (1988) Matsumoto, T., Kato, K., Imai, H.: An improved algorithm for secure outsourcing of modular exponentiations. In: Proceedings of CRYPTO 1988, pp. 497–506. LNCS, Springer, Cham (1988)
35.
Zurück zum Zitat Scott, M.: Unbalancing pairing-based key exchange protocols. In: IACR Cryptology ePrint Archive, no. 688 (2013) Scott, M.: Unbalancing pairing-based key exchange protocols. In: IACR Cryptology ePrint Archive, no. 688 (2013)
36.
Zurück zum Zitat Shi, Y., Li, J.: Provable efficient certificateless public key encryption. In: IACR Cryptology ePrint Archive, no. 284 (2005) Shi, Y., Li, J.: Provable efficient certificateless public key encryption. In: IACR Cryptology ePrint Archive, no. 284 (2005)
38.
Zurück zum Zitat Yao, A.: Protocols for secure computations. In: Proceedings of 23rd IEEE FOCS, pp. 160–168 (1982) Yao, A.: Protocols for secure computations. In: Proceedings of 23rd IEEE FOCS, pp. 160–168 (1982)
Metadaten
Titel
Secure and Efficient Delegation of Elliptic-Curve Pairing
verfasst von
Giovanni Di Crescenzo
Matluba Khodjaeva
Delaram Kahrobaei
Vladimir Shpilrain
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-57808-4_3

Premium Partner