2014
DOI: 10.1007/978-3-319-11203-9_19
|View full text |Cite
|
Sign up to set email alerts
|

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage

Abstract: Provable Data Possession (PDP) allows a file owner to outsource her files to a storage server such that a verifier can check the integrity of the outsourced file. Public verifiable PDP schemes allow any one other than the file owner to be a verifier. At the client side (file owner or verifier), a substantial number of modular exponentiations is often required. In this paper we make PDP more practical via proposing a protocol to securely outsource the (most generic) variable-exponent variable-base exponentiatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
103
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 77 publications
(103 citation statements)
references
References 26 publications
(47 reference statements)
0
103
0
Order By: Relevance
“…5. Our algorithm for the case of simultaneous modular exponentiation is more efficient than the existing algorithms [2] and [5] (there is only a generalized result in [22], for which the checkability fails as explained above). The algorithm proposed in [2] only considers two simultaneous modular exponentiations.…”
Section: Our Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…5. Our algorithm for the case of simultaneous modular exponentiation is more efficient than the existing algorithms [2] and [5] (there is only a generalized result in [22], for which the checkability fails as explained above). The algorithm proposed in [2] only considers two simultaneous modular exponentiations.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Many algorithms have been proposed for outsourcing computation [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. They aim either to have a better outsourcing security model or to have more efficient constructions.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations