Abstract
Modular exponentiation is an expensive discrete-logarithm operation, difficult for resource-constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing, users are willing to securely outsourcing modular exponentiations to cloud servers to reduce computation overhead. In this paper, we contrive a fully verifiable secure outsourcing scheme for modular exponentiation with only a single server, named MExp. MExp not only prevents users’ private information leakage during outsourcing by our new logical division method, but also eliminates collusion attacks occurring in algorithms with two untrusted servers. Moreover, our MExp allows outsourcers to detect any misbehavior with a probability of 1, which shows significant improvement in checkability when compare to other single-server-based schemes. With a view to reducing computation overhead, MExp is extended to multiple modular exponentiations, named M2Exp. The algorithm significantly diminishes the local costs of multiple modular exponentiation calculations and the checkability is still 1. Compared with existing state-of-the-art schemes, MExp and M2Exp have outstanding performance in both efficiency and checkability. Finally, MExp and M2Exp are applied to Cramer–Shoup encryptions and Schnorr signatures.
Similar content being viewed by others
References
Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)
Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4(6), 2751–2763 (2016)
Gani, A., Siddiqa, A., Shamshirband, S., et al.: A survey on indexing techniques for big data: taxonomy and performance evaluation. Knowl. Inf. Syst. 46(2), 241–284 (2016)
Naranjo, P.G.V., Baccarelli, E., Scarpiniti, M.: Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications. J. Supercomput. 74, 1–38 (2018)
Pooranian Z. et al.: RARE: defeating side channels based on data-deduplication in cloud storage. In: Proceeding of the INFOCOM CCSNA, pp. 1–6 (2018)
Khan, A.N., Kiah, M.L.M., Ali, M., et al.: A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13(4), 651–675 (2015)
Jan, B., Khan, F.G., Montrucchio, B., et al.: Introducing ToPe-FFT: an OpenCL-based FFT library targeting GPUs. Concurr. Comput. 29(21), 4256 (2017)
Javanmardi, S., Shojafar, M., Shariatmadari, S., et al.: Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int. J. Grid Util. Comput. 6(1), 57–66 (2014)
Javanmardi, S., Shojafar, M., Amendola, D. et al.: Hybrid job scheduling algorithm for cloud computing environment. InL Proceeding of the IBICA, pp. 43–52 (2014)
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Proceeding of the CRYPTO, pp. 89–105 (1992)
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceeding of the TCC, pp. 264–282 (2005)
Fu, A., Yu, S., Zhang, Y., et al.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transac. Big Data (2017). https://doi.org/10.1109/TBDATA.2017.2701347
Huang, L., Zhang, G., Fu, A.: Privacy-preserving public auditing for non-manager group. In: Proceeding of the IEEE ICC, pp. 1–6 (2017)
Fu, A., Li, Y., Yu, S., Yu, Y., Zhang, G.: DIPOR: an IDA-based dynamic proof of retrievability scheme for cloud storage systems. J. Netw Comput. Appl. 104, 97–106 (2018)
Yu, Y., Luo, Y., Wang, D. et al.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In Proceeding of the IEEE ICC, pp. 1–6 (2016)
Chen, X., Li, J., Ma, J., et al.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)
Ye, J., Chen, X., Ma. J.: An improved algorithm for secure outsourcing of modular exponentiations. In: Proceeding of the IEEE AINA, pp. 73–76 (2015)
Ren, Y., Ding, N., Zhang, X. et al.: Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: Proceeding of the ACM ASIACCS, pp. 293–303 (2016)
Kuppusamy, L., Rangasamy, J.: CRT-based outsourcing algorithms for modular exponentiations. In: Proceeding of the INDOCRYPT, pp. 81–98 (2016)
Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)
Dijk, M.V., Clarke, D., Gassend, B., et al.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Crypt. 39(2), 253–273 (2006)
Wang, Y., Wu, Q., Wong, D.S. et al.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Proceeding of the ESORICS, pp. 326–343 (2014)
Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. In: Proceeding of the ESORICS, pp. 261–278 (2016)
Xiang, C., Tang, C.: Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. J. Ambient Intell. Human. Comput. 6(1), 131–139 (2015)
Ding, Y., Xu, Z., Ye, J., et al.: Secure outsourcing of modular exponentiations under single untrusted programme model. J. Comput. Syst. Sci. 90, 1–13 (2016)
Kiraz, M.S., Uzunkol, O.: Efficient and Verifiable algorithms for secure outsourcing of cryptographic computations. Int. J. Inf. Secur. 15(5), 519–537 (2016)
Li, S., Huang, L., Fu, A., et al.: CEXP: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server. Digital Commun. Netw. 3(4), 236–241 (2017)
Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Clust. Comput. 16(4), 787–796 (2013)
Li, J., Guan, Z., Du, X. et al.: An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing. In: Proceeding of the IEEE ICC, pp. 1–6 (2017)
Chen, X., Huang, X., Li, J., et al.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2015)
Li, J., Huang, X., Li, J., et al.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)
Wang, J., Hu, S., Wang, Q., et al.: Privacy-preserving outsourced feature extractions in the cloud: a survey. IEEE Netw. 31(5), 36–41 (2017)
Xu, G., Amariucai, G.T., Guan, Y.: Delegation of computation with verification outsourcing: curious verifiers. IEEE Trans. Parallel Distrib. Syst. 28(3), 717–730 (2017)
Zhou, L., Zhu, Y., Choo, K.K.R.: Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gener. Comput. Syst. 81, 404–413 (2017)
Lei, X., Liao, X., Ma, X., et al.: Securely and efficiently perform large matrix rank decomposition computation via cloud computing. Clust. Comput. 18(2), 989–997 (2015)
Li, P., Li, J., Huang, Z., et al.: Privacy-preserving outsourced classification in cloud computing. Clust. Comput. (2017). https://doi.org/10.1007/s10586-017-1133-8
Liu, X., Deng, R.H., Choo, K.K.R., et al.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 8(5), 2401–2414 (2016)
Wang, H., He, D., Han, J.: VOD-ADAC: anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud. IEEE Trans. Serv. Comput. (2017). https://doi.org/10.1109/TSC.2017.2687459
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Elgamal, T.: A publi-key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Proceeding of the CRYPTO, pp. 13–25 (1998)
Ford, W., Baum, M.S.: Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Prentice-Hall, Upper Saddle River (2000)
Wang, H., Xu, M., Guo, X.: Cryptanalysis and improvement of several certificateless digital signature schemes. J. Commun. 29(5), 306–309 (2008)
Schnorr, C.P.: Efficient identification and signatures for smart cards. Proc. CRYPTO 435, 239–252 (1989)
Acknowledgements
This work is supported by National Science Foundation of China (61572255, 61702266), Natural Science Foundation of Jiangsu Province, China (BK20150787), Six talent peaks project of Jiangsu Province, China (XYDXXJS-032).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fu, A., Zhu, Y., Yang, G. et al. Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. Cluster Comput 21, 1933–1947 (2018). https://doi.org/10.1007/s10586-018-2830-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2830-7