{"title":"Outsourcing of Verifiable Composite Modular Exponentiations","authors":"Jie Liu, Bo Yang, Zhiguo Du","doi":"10.1109/INCoS.2013.102","DOIUrl":null,"url":null,"abstract":"Modular exponentiation as a basic operation is widely used in discrete-log based cryptographic protocols. Most research has been made for outsourcing exponentiation modular a prime, works for outsourcing composite modular exponentiation are rare. In this paper, we propose two new secure outsourcing protocols for verifiable composite modular exponentiation and batch composite modular exponentiations respectively. We analyze the security and complexity of the protocols. Ours are more efficient.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Modular exponentiation as a basic operation is widely used in discrete-log based cryptographic protocols. Most research has been made for outsourcing exponentiation modular a prime, works for outsourcing composite modular exponentiation are rare. In this paper, we propose two new secure outsourcing protocols for verifiable composite modular exponentiation and batch composite modular exponentiations respectively. We analyze the security and complexity of the protocols. Ours are more efficient.