Skip to main content
Log in

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Modular exponentiation is an expensive discrete-logarithm operation, difficult for resource-constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing, users are willing to securely outsourcing modular exponentiations to cloud servers to reduce computation overhead. In this paper, we contrive a fully verifiable secure outsourcing scheme for modular exponentiation with only a single server, named MExp. MExp not only prevents users’ private information leakage during outsourcing by our new logical division method, but also eliminates collusion attacks occurring in algorithms with two untrusted servers. Moreover, our MExp allows outsourcers to detect any misbehavior with a probability of 1, which shows significant improvement in checkability when compare to other single-server-based schemes. With a view to reducing computation overhead, MExp is extended to multiple modular exponentiations, named M2Exp. The algorithm significantly diminishes the local costs of multiple modular exponentiation calculations and the checkability is still 1. Compared with existing state-of-the-art schemes, MExp and M2Exp have outstanding performance in both efficiency and checkability. Finally, MExp and M2Exp are applied to Cramer–Shoup encryptions and Schnorr signatures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)

    Article  Google Scholar 

  2. Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4(6), 2751–2763 (2016)

    Article  Google Scholar 

  3. Gani, A., Siddiqa, A., Shamshirband, S., et al.: A survey on indexing techniques for big data: taxonomy and performance evaluation. Knowl. Inf. Syst. 46(2), 241–284 (2016)

    Article  Google Scholar 

  4. Naranjo, P.G.V., Baccarelli, E., Scarpiniti, M.: Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications. J. Supercomput. 74, 1–38 (2018)

    Article  Google Scholar 

  5. Pooranian Z. et al.: RARE: defeating side channels based on data-deduplication in cloud storage. In: Proceeding of the INFOCOM CCSNA, pp. 1–6 (2018)

  6. Khan, A.N., Kiah, M.L.M., Ali, M., et al.: A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13(4), 651–675 (2015)

    Article  Google Scholar 

  7. Jan, B., Khan, F.G., Montrucchio, B., et al.: Introducing ToPe-FFT: an OpenCL-based FFT library targeting GPUs. Concurr. Comput. 29(21), 4256 (2017)

    Article  Google Scholar 

  8. Javanmardi, S., Shojafar, M., Shariatmadari, S., et al.: Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int. J. Grid Util. Comput. 6(1), 57–66 (2014)

    Article  Google Scholar 

  9. Javanmardi, S., Shojafar, M., Amendola, D. et al.: Hybrid job scheduling algorithm for cloud computing environment. InL Proceeding of the IBICA, pp. 43–52 (2014)

  10. Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Proceeding of the CRYPTO, pp. 89–105 (1992)

  11. Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceeding of the TCC, pp. 264–282 (2005)

    Chapter  Google Scholar 

  12. Fu, A., Yu, S., Zhang, Y., et al.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transac. Big Data (2017). https://doi.org/10.1109/TBDATA.2017.2701347

    Article  Google Scholar 

  13. Huang, L., Zhang, G., Fu, A.: Privacy-preserving public auditing for non-manager group. In: Proceeding of the IEEE ICC, pp. 1–6 (2017)

  14. Fu, A., Li, Y., Yu, S., Yu, Y., Zhang, G.: DIPOR: an IDA-based dynamic proof of retrievability scheme for cloud storage systems. J. Netw Comput. Appl. 104, 97–106 (2018)

    Article  Google Scholar 

  15. Yu, Y., Luo, Y., Wang, D. et al.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In Proceeding of the IEEE ICC, pp. 1–6 (2016)

  16. Chen, X., Li, J., Ma, J., et al.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)

    Article  Google Scholar 

  17. Ye, J., Chen, X., Ma. J.: An improved algorithm for secure outsourcing of modular exponentiations. In: Proceeding of the IEEE AINA, pp. 73–76 (2015)

  18. Ren, Y., Ding, N., Zhang, X. et al.: Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: Proceeding of the ACM ASIACCS, pp. 293–303 (2016)

  19. Kuppusamy, L., Rangasamy, J.: CRT-based outsourcing algorithms for modular exponentiations. In: Proceeding of the INDOCRYPT, pp. 81–98 (2016)

    Chapter  Google Scholar 

  20. Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)

    Article  Google Scholar 

  21. Dijk, M.V., Clarke, D., Gassend, B., et al.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Crypt. 39(2), 253–273 (2006)

    Article  MathSciNet  Google Scholar 

  22. Wang, Y., Wu, Q., Wong, D.S. et al.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Proceeding of the ESORICS, pp. 326–343 (2014)

    Google Scholar 

  23. Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. In: Proceeding of the ESORICS, pp. 261–278 (2016)

    Chapter  Google Scholar 

  24. Xiang, C., Tang, C.: Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. J. Ambient Intell. Human. Comput. 6(1), 131–139 (2015)

    Article  Google Scholar 

  25. Ding, Y., Xu, Z., Ye, J., et al.: Secure outsourcing of modular exponentiations under single untrusted programme model. J. Comput. Syst. Sci. 90, 1–13 (2016)

    Article  MathSciNet  Google Scholar 

  26. Kiraz, M.S., Uzunkol, O.: Efficient and Verifiable algorithms for secure outsourcing of cryptographic computations. Int. J. Inf. Secur. 15(5), 519–537 (2016)

    Article  Google Scholar 

  27. Li, S., Huang, L., Fu, A., et al.: CEXP: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server. Digital Commun. Netw. 3(4), 236–241 (2017)

    Article  Google Scholar 

  28. Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Clust. Comput. 16(4), 787–796 (2013)

    Article  Google Scholar 

  29. Li, J., Guan, Z., Du, X. et al.: An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing. In: Proceeding of the IEEE ICC, pp. 1–6 (2017)

  30. Chen, X., Huang, X., Li, J., et al.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2015)

    Article  Google Scholar 

  31. Li, J., Huang, X., Li, J., et al.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)

    Article  Google Scholar 

  32. Wang, J., Hu, S., Wang, Q., et al.: Privacy-preserving outsourced feature extractions in the cloud: a survey. IEEE Netw. 31(5), 36–41 (2017)

    Article  MathSciNet  Google Scholar 

  33. Xu, G., Amariucai, G.T., Guan, Y.: Delegation of computation with verification outsourcing: curious verifiers. IEEE Trans. Parallel Distrib. Syst. 28(3), 717–730 (2017)

    Article  Google Scholar 

  34. Zhou, L., Zhu, Y., Choo, K.K.R.: Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gener. Comput. Syst. 81, 404–413 (2017)

    Article  Google Scholar 

  35. Lei, X., Liao, X., Ma, X., et al.: Securely and efficiently perform large matrix rank decomposition computation via cloud computing. Clust. Comput. 18(2), 989–997 (2015)

    Article  Google Scholar 

  36. Li, P., Li, J., Huang, Z., et al.: Privacy-preserving outsourced classification in cloud computing. Clust. Comput. (2017). https://doi.org/10.1007/s10586-017-1133-8

    Article  Google Scholar 

  37. Liu, X., Deng, R.H., Choo, K.K.R., et al.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 8(5), 2401–2414 (2016)

    Article  Google Scholar 

  38. Wang, H., He, D., Han, J.: VOD-ADAC: anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud. IEEE Trans. Serv. Comput. (2017). https://doi.org/10.1109/TSC.2017.2687459

    Article  Google Scholar 

  39. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  40. Elgamal, T.: A publi-key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  41. Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Proceeding of the CRYPTO, pp. 13–25 (1998)

    Chapter  Google Scholar 

  42. Ford, W., Baum, M.S.: Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Prentice-Hall, Upper Saddle River (2000)

    Google Scholar 

  43. Wang, H., Xu, M., Guo, X.: Cryptanalysis and improvement of several certificateless digital signature schemes. J. Commun. 29(5), 306–309 (2008)

    Google Scholar 

  44. Schnorr, C.P.: Efficient identification and signatures for smart cards. Proc. CRYPTO 435, 239–252 (1989)

    MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is supported by National Science Foundation of China (61572255, 61702266), Natural Science Foundation of Jiangsu Province, China (BK20150787), Six talent peaks project of Jiangsu Province, China (XYDXXJS-032).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anmin Fu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fu, A., Zhu, Y., Yang, G. et al. Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. Cluster Comput 21, 1933–1947 (2018). https://doi.org/10.1007/s10586-018-2830-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2830-7

Keywords

Navigation