File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TSC.2019.2937486
- Scopus: eid_2-s2.0-85124584498
- WOS: WOS:000752017400019
Supplementary
- Citations:
- Appears in Collections:
Article: Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus
Title | Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus |
---|---|
Authors | |
Keywords | Cloud computing efficiency modular inversion privacy unimodular matrix transformation |
Issue Date | 2022 |
Citation | IEEE Transactions on Services Computing, 2022, v. 15, n. 1, p. 241-253 How to Cite? |
Abstract | In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results returned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-client's computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given. |
Persistent Identifier | http://hdl.handle.net/10722/311980 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tian, Chengliang | - |
dc.contributor.author | Yu, Jia | - |
dc.contributor.author | Zhang, Hanlin | - |
dc.contributor.author | Xue, Haiyang | - |
dc.contributor.author | Wang, Cong | - |
dc.contributor.author | Ren, Kui | - |
dc.date.accessioned | 2022-04-06T04:31:54Z | - |
dc.date.available | 2022-04-06T04:31:54Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | IEEE Transactions on Services Computing, 2022, v. 15, n. 1, p. 241-253 | - |
dc.identifier.uri | http://hdl.handle.net/10722/311980 | - |
dc.description.abstract | In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results returned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-client's computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Services Computing | - |
dc.subject | Cloud computing | - |
dc.subject | efficiency | - |
dc.subject | modular inversion | - |
dc.subject | privacy | - |
dc.subject | unimodular matrix transformation | - |
dc.title | Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TSC.2019.2937486 | - |
dc.identifier.scopus | eid_2-s2.0-85124584498 | - |
dc.identifier.volume | 15 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | 241 | - |
dc.identifier.epage | 253 | - |
dc.identifier.eissn | 1939-1374 | - |
dc.identifier.isi | WOS:000752017400019 | - |