Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security 2016
DOI: 10.1145/2897845.2897881
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability

Abstract: The problem of securely outsourcing computation has received widespread attention due to the development of cloud computing and mobile devices. In this paper, we first propose a secure verifiable outsourcing algorithm of single modular exponentiation based on the one-malicious model of two untrusted servers. The outsourcer could detect any failure with probability 1 if one of the servers misbehaves. We also present the other verifiable outsourcing algorithm for multiple modular exponentiations based on the sam… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(30 citation statements)
references
References 31 publications
0
29
1
Order By: Relevance
“…Subsequent works for verifiable computation of the general function include other works, 6,12,22,23 and the previous works [24][25][26][27][28] concentrate on schemes to improve the efficiency for computing the specific function. Subsequent works for verifiable computation of the general function include other works, 6,12,22,23 and the previous works [24][25][26][27][28] concentrate on schemes to improve the efficiency for computing the specific function.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequent works for verifiable computation of the general function include other works, 6,12,22,23 and the previous works [24][25][26][27][28] concentrate on schemes to improve the efficiency for computing the specific function. Subsequent works for verifiable computation of the general function include other works, 6,12,22,23 and the previous works [24][25][26][27][28] concentrate on schemes to improve the efficiency for computing the specific function.…”
Section: Related Workmentioning
confidence: 99%
“…Gennaro et al 2 first introduced and formalized the non-interactive verifiable outsourced computation. Subsequent works for verifiable computation of the general function include other works, 6,12,22,23 and the previous works [24][25][26][27][28] concentrate on schemes to improve the efficiency for computing the specific function. Several previous schemes only allow one specific client to privately verify the result during each round of computational process, which has some inherent limitations as introduced above.…”
Section: Related Workmentioning
confidence: 99%
“…However, it is still possible for the outsourcer to be cheated by the server. Ren et al then constructed a verifiable outsourcing scheme of MExps, where the outsourcer can detect the error with a probability of 1 if the server misbehaves [6]. Lai et al [7] proposed an attribute-based encryption (ABE) scheme with verifiable outsourcing decryption, which guaranteed that an outsourcer can efficiently detect the wrong results.…”
Section: Related Workmentioning
confidence: 99%
“…Assume that 1 is an honest server and 2 is a malicious server. At the end of the algorithm, the outsourcer verifies the results by formulas (4)- (6). It is obvious that 2 must generate the correct value of 21 ; otherwise, formula (4) cannot pass the verification with a probability of 1.…”
Section: Theoremmentioning
confidence: 99%
See 1 more Smart Citation