Affiliation:
1. Perspecta Labs Inc. Basking Ridge, NJ, United States of America
2. CUNY John Jay College of Criminal Justice. New York, NY, United States of America
3. University of York. Heslington, York, United Kingdom
4. City University of New York. New, York, NY, United States of America
Abstract
AbstractMany public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of performing a relatively small number of modular multiplications) delegates such primitive operations to a computationally stronger server. Important requirements for such delegation protocols include privacy of the client’s input exponent and security of the client’s output, in the sense of detecting, except for very small probability, any malicious server’s attempt to convince the client of an incorrect exponentiation result. Only recently, efficient protocols for the delegation of a fixed-based exponentiation, over cyclic and RSA-type groups with certain properties, have been presented and proved to satisfy both requirements.In this paper we show that a product of many fixed-base exponentiations, over a cyclic groups with certain properties, can be privately and securely delegated by keeping the client’s online number of modular multiplications only slightly larger than in the delegation of a single exponentiation. We use this result to show the first delegations of entire cryptographic schemes: the well-known digital signature schemes by El-Gamal, Schnorr and Okamoto, over the q-order subgroup in ℤp, for p, q primes, as well as their variants based on elliptic curves. Previous efficient delegation results were limited to the delegation of single algorithms within cryptographic schemes.
Subject
Applied Mathematics,Computational Mathematics,Computer Science Applications
Reference92 articles.
1. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack;SIAM Journal on Computing,2003
2. Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications;Proc. of ACM CCS Conference,2012
3. Privacy-Preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server;KSII Transactions on Internet & Information Systems,2017
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献