File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus

TitleNovel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus
Authors
KeywordsCloud computing
efficiency
modular inversion
privacy
unimodular matrix transformation
Issue Date2022
Citation
IEEE Transactions on Services Computing, 2022, v. 15, n. 1, p. 241-253 How to Cite?
AbstractIn cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results returned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-client's computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given.
Persistent Identifierhttp://hdl.handle.net/10722/311980
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorTian, Chengliang-
dc.contributor.authorYu, Jia-
dc.contributor.authorZhang, Hanlin-
dc.contributor.authorXue, Haiyang-
dc.contributor.authorWang, Cong-
dc.contributor.authorRen, Kui-
dc.date.accessioned2022-04-06T04:31:54Z-
dc.date.available2022-04-06T04:31:54Z-
dc.date.issued2022-
dc.identifier.citationIEEE Transactions on Services Computing, 2022, v. 15, n. 1, p. 241-253-
dc.identifier.urihttp://hdl.handle.net/10722/311980-
dc.description.abstractIn cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results returned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-client's computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Services Computing-
dc.subjectCloud computing-
dc.subjectefficiency-
dc.subjectmodular inversion-
dc.subjectprivacy-
dc.subjectunimodular matrix transformation-
dc.titleNovel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TSC.2019.2937486-
dc.identifier.scopuseid_2-s2.0-85124584498-
dc.identifier.volume15-
dc.identifier.issue1-
dc.identifier.spage241-
dc.identifier.epage253-
dc.identifier.eissn1939-1374-
dc.identifier.isiWOS:000752017400019-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats