With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attentions in the scientific community. Exponentiations modulo a large prime have been considered the most expensive operation in discrete-logarithm based cryptographic protocols, and the computationally limited devices such as RFID tags or smartcard may be incapable to accomplish these operations. Therefore, it is meaningful to present an efficient method to securely outsource most of this work-load to (untrusted) cloud servers. In this paper, we propose a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modular a p...
Group exponentiation is an important operation used in many public-key cryptosystems and, more gener...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
peer reviewedWith the rapid development in availability of cloud services, the techniques for secure...
Abstract—With the rapid development of cloud services, the techniques for securely outsourcing the p...
2018, Springer Science+Business Media, LLC, part of Springer Nature. Modular exponentiation is an ex...
Abstract. Being required in many applications, modular exponentia-tions form the most expensive part...
© 2018 IEEE. Nowadays, cloud computing is increasingly popular. As its important application, outsou...
© 2018 Elsevier Ltd Outsourcing computing allows users with resource-constrained devices to outsourc...
Outsourcing computing allows users with resource-constrained devices to outsource their complex comp...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
International audienceWe address the problem of speeding up group computations in cryptography using...
Modern web applications using advanced cryptographic methods may need to calculate a large number of...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
Security protocols using public-key cryptography often requires large number of costly modular expon...
Group exponentiation is an important operation used in many public-key cryptosystems and, more gener...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
peer reviewedWith the rapid development in availability of cloud services, the techniques for secure...
Abstract—With the rapid development of cloud services, the techniques for securely outsourcing the p...
2018, Springer Science+Business Media, LLC, part of Springer Nature. Modular exponentiation is an ex...
Abstract. Being required in many applications, modular exponentia-tions form the most expensive part...
© 2018 IEEE. Nowadays, cloud computing is increasingly popular. As its important application, outsou...
© 2018 Elsevier Ltd Outsourcing computing allows users with resource-constrained devices to outsourc...
Outsourcing computing allows users with resource-constrained devices to outsource their complex comp...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
International audienceWe address the problem of speeding up group computations in cryptography using...
Modern web applications using advanced cryptographic methods may need to calculate a large number of...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
Security protocols using public-key cryptography often requires large number of costly modular expon...
Group exponentiation is an important operation used in many public-key cryptosystems and, more gener...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...