Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations

verfasst von: E. B. Aleksandrova, E. N. Shkorkina

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

When carrying out outsourced cryptographic computations, it is possible not only to have errors in server computations but also to interact with a malicious computing server. In this paper, we propose an undeniable signature protocol adapted for a group of points of elliptic curve. We also present an outsourced algorithm for elliptic curve point multiplication.
Literatur
1.
Zurück zum Zitat Ch, R., Rao, K.V., and Vasumathi, D., Identity-based cryptosystem based on tate pairing, Global J. Comput. Sci. Technol., 2016, vol. 16, no. 5. Ch, R., Rao, K.V., and Vasumathi, D., Identity-based cryptosystem based on tate pairing, Global J. Comput. Sci. Technol., 2016, vol. 16, no. 5.
2.
Zurück zum Zitat Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., and Tang, Q., Efficient algorithms for secure outsourcing of bilinear pairings, Theor. Comput. Sci., 2015, vol. 562, pp. 112–121.MathSciNetCrossRefMATH Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., and Tang, Q., Efficient algorithms for secure outsourcing of bilinear pairings, Theor. Comput. Sci., 2015, vol. 562, pp. 112–121.MathSciNetCrossRefMATH
3.
Zurück zum Zitat Tian, H., Zhang, F., and Ren, K., Secure bilinear pairing outsourcing made more efficient and flexible, ASIA CCS’15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015, pp. 417–426. Tian, H., Zhang, F., and Ren, K., Secure bilinear pairing outsourcing made more efficient and flexible, ASIA CCS’15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015, pp. 417–426.
4.
Zurück zum Zitat Arabaci, O., Kiraz, M.S., Sertkaya, I., and Uzunkol, O., More efficient secure outsourcing methods for bilinear maps, Cryptol. ePrint Arch., 2016, no. 960. Arabaci, O., Kiraz, M.S., Sertkaya, I., and Uzunkol, O., More efficient secure outsourcing methods for bilinear maps, Cryptol. ePrint Arch., 2016, no. 960.
5.
Zurück zum Zitat Ren, Y., Dong, M., Niu, Z., and Du, X., Noninteractive verifiable outsourcing algorithm for bilinear pairing with improved checkability, Secur. Commun. Networks, 2017, vol. 2017. Ren, Y., Dong, M., Niu, Z., and Du, X., Noninteractive verifiable outsourcing algorithm for bilinear pairing with improved checkability, Secur. Commun. Networks, 2017, vol. 2017.
6.
Zurück zum Zitat Chaum, D. and Van Antwerpen, H., Undeniable signatures, Conference on the Theory and Application of Cryptology, New York, 1989, pp. 212–216. Chaum, D. and Van Antwerpen, H., Undeniable signatures, Conference on the Theory and Application of Cryptology, New York, 1989, pp. 212–216.
7.
Zurück zum Zitat Jao, D. and Soukharev, V., Isogeny-based quantum-resistant undeniable signatures, International Workshop on Post-Quantum Cryptography, Cham, 2014, pp. 160–179. Jao, D. and Soukharev, V., Isogeny-based quantum-resistant undeniable signatures, International Workshop on Post-Quantum Cryptography, Cham, 2014, pp. 160–179.
8.
Zurück zum Zitat Lin, X.J., Sun, L., Qu, H., and Zhang, X., New approaches for secure outsourcing algorithm for modular exponentiations, Cryptol. ePrint Arch., 2016, no. 45. Lin, X.J., Sun, L., Qu, H., and Zhang, X., New approaches for secure outsourcing algorithm for modular exponentiations, Cryptol. ePrint Arch., 2016, no. 45.
9.
Zurück zum Zitat Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Elliptic curves generation for isogeny-based cryptosystems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 928–935.CrossRef Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Elliptic curves generation for isogeny-based cryptosystems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 928–935.CrossRef
Metadaten
Titel
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations
verfasst von
E. B. Aleksandrova
E. N. Shkorkina
Publikationsdatum
01.12.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080023

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt