2020
DOI: 10.1016/j.ins.2019.10.007
|View full text |Cite
|
Sign up to set email alerts
|

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…Step 5: Compute private key, d, from the following equation: ed  1 mod (n). In fact, the key to find the result in this step is to use extended Euclidean algorithm [16][17][18]. Process 2 (Encryption Process): it is the process to transform plaintext, m, where 0 < m < n, as unreadable message or ciphertext, c, before sending to receiver by using the following equation:…”
Section: Related Work 21 Rsamentioning
confidence: 99%
“…Step 5: Compute private key, d, from the following equation: ed  1 mod (n). In fact, the key to find the result in this step is to use extended Euclidean algorithm [16][17][18]. Process 2 (Encryption Process): it is the process to transform plaintext, m, where 0 < m < n, as unreadable message or ciphertext, c, before sending to receiver by using the following equation:…”
Section: Related Work 21 Rsamentioning
confidence: 99%
“…Due to the above-mentioned tremendous benefits of cloud computing, designing secure and efficient outsourcing algorithms for various of computation-extensive tasks, such as large-scale linear algebraic operations [3,14], modular exponentiations and modular inverse operations in cryptography [18,27,45,56], large-scale graph operations [54], heavy computations in artificial intelligence (AI) and internet of things (IoT) [28,51,52], has become a popular topic. Out of which, the outsourcing of matrix-related operations is closely related with our work.…”
Section: A Related Workmentioning
confidence: 99%
“…Computing d, from e*d mod Φ (n) = 1, is performed in the last step. In fact, Extended Euclidean Algorithm or the improved methods [14], [15] are the method to calculate d. The second process is the encryption process. It will convert the original plaintext, m, as unreadable message or ciphertext, c, from the equation: c = m e mod n. However, m will be recovered by using the decryption equation: m = c d mod n in the last process.…”
Section: Rsamentioning
confidence: 99%