2020
DOI: 10.1109/jiot.2020.2970499
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 40 publications
0
12
0
1
Order By: Relevance
“…The algorithms which only rely on global attributes often take the whole network structure as a parameter until all community structures are detected, which leads to the high complexity and it is not suitable for large-scale networks with complex structures like IoT [20], [21].…”
Section: The Non-overlapping Community Detection Algorithms 1) Thementioning
confidence: 99%
“…The algorithms which only rely on global attributes often take the whole network structure as a parameter until all community structures are detected, which leads to the high complexity and it is not suitable for large-scale networks with complex structures like IoT [20], [21].…”
Section: The Non-overlapping Community Detection Algorithms 1) Thementioning
confidence: 99%
“…We first provide a short description of the classical "textbook" RSA public-key encryption scheme [15] (using the notations from [18]): It has been proposed as soon as in 1982 by Quisquater and Couvreur [12] to use the Chinese Remainder Theorem (CRT) in order to improve the efficiency of the decryption algorithm. The "textbook" RSA-CRT public-key encryption scheme is modified as follows: Key Generation: With the same notation as above, the algorithm additionally computes…”
Section: Description Of Zhang Et Al's Protocolmentioning
confidence: 99%
“…Following Kerckhoff's principles [6], it is natural to assume that the adversary knows the public key (n, e) it attacks. Zhang et al [18], indeed do not add the value of the public exponent e to the list of secret inputs in their "security proof". Actually, in practical applications, RSA users very often use e = 2 16 + 1 = 65537 as the public exponent.…”
Section: A Passive Attack On the Protocol Privacymentioning
confidence: 99%
See 2 more Smart Citations