© 2018 Elsevier Ltd Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers, which is more economical for cloud customers. However, since users lose direct control of the computation task, possible threats need to be addressed, such as data privacy and the correctness of results. Modular exponentiation is one of the most basic and time-consuming operations but widely applied in the field of cryptography. In this paper, we propose two new and efficient algorithms for secure outsourcing of single and multiple composite modular exponentiations. Unlike the algorithms based on two untrusted servers, we outsource modular exponentiation operation to only a single server...
Security protocols using public-key cryptography often requires large number of costly modular expon...
With the growing popularity of cloud computing, outsourced computing has attracted much research eff...
Modern web applications using advanced cryptographic methods may need to calculate a large number of...
© 2018 IEEE. Nowadays, cloud computing is increasingly popular. As its important application, outsou...
2018, Springer Science+Business Media, LLC, part of Springer Nature. Modular exponentiation is an ex...
Outsourcing computing allows users with resource-constrained devices to outsource their complex comp...
Abstract. Being required in many applications, modular exponentia-tions form the most expensive part...
Abstract—With the rapid development of cloud services, the techniques for securely outsourcing the p...
peer reviewedWith the rapid development in availability of cloud services, the techniques for secure...
International audienceWe address the problem of speeding up group computations in cryptography using...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
Matrix Multiplication is a basic engineering and scientific problem, which has application in variou...
Abstract. With the emergence of cloud computing services, a resource-constrained client can outsourc...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Security protocols using public-key cryptography often requires large number of costly modular expon...
With the growing popularity of cloud computing, outsourced computing has attracted much research eff...
Modern web applications using advanced cryptographic methods may need to calculate a large number of...
© 2018 IEEE. Nowadays, cloud computing is increasingly popular. As its important application, outsou...
2018, Springer Science+Business Media, LLC, part of Springer Nature. Modular exponentiation is an ex...
Outsourcing computing allows users with resource-constrained devices to outsource their complex comp...
Abstract. Being required in many applications, modular exponentia-tions form the most expensive part...
Abstract—With the rapid development of cloud services, the techniques for securely outsourcing the p...
peer reviewedWith the rapid development in availability of cloud services, the techniques for secure...
International audienceWe address the problem of speeding up group computations in cryptography using...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
Matrix Multiplication is a basic engineering and scientific problem, which has application in variou...
Abstract. With the emergence of cloud computing services, a resource-constrained client can outsourc...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Security protocols using public-key cryptography often requires large number of costly modular expon...
With the growing popularity of cloud computing, outsourced computing has attracted much research eff...
Modern web applications using advanced cryptographic methods may need to calculate a large number of...