Filters








14,283 Hits in 4.6 sec

Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing

2017 KSII Transactions on Internet and Information Systems  
Currently, most of the algorithms for outsourcing bilinear pairing have small checkability or the outsourcers need to operate expensive computations.  ...  Finally, the performance evaluation demonstrates that the proposed algorithm is most efficient in all of fully verifiable outsourcing algorithms for bilinear pairing.  ...  At the same time, a lot of computational time can be saved for devices those are computationally incapable of carrying out cryptographic algorithms by outsourcing computation to powerful cloud servers.  ... 
doi:10.3837/tiis.2017.07.019 fatcat:cdgwbn4cereqdmxdhm37kffpqa

Efficient algorithms for secure outsourcing of bilinear pairings

Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang
2015 Theoretical Computer Science  
In this paper, we first propose an efficient and secure outsourcing algorithm for bilinear pairings in the two untrusted program model.  ...  In this paper, we first propose an efficient and secure outsourcing algorithm for bilinear pairings in the two untrusted program model.  ...  are computationally indistin-Pair One.  ... 
doi:10.1016/j.tcs.2014.09.038 fatcat:vwrod5hnknf2pocxvg372pvnia

Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability

Yanli Ren, Min Dong, Zhihua Niu, Xiaoni Du
2017 Security and Communication Networks  
It is well known that the computation of bilinear pairing is the most expensive operation in pairing-based cryptography.  ...  In this paper, we propose a noninteractive verifiable outsourcing algorithm of bilinear pairing based on two servers in the one-malicious model.  ...  Acknowledgments The work described in this paper was supported by the National Natural Science Foundation of China (Grant no. 61572309), Natural Science Foundation of Shanghai (no. 16ZR1411200), and Program for  ... 
doi:10.1155/2017/4892814 fatcat:av2wwzgfyfgbzaal7ts6zoogjq

Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server

Jiaxiang Yang, Yanping Li, Yanli Ren
2019 International Journal of Network Security  
However, almost all the existing outsourcing algorithms for bilinear pairings can only outsource one pairing operation at one time, and multiple pairings need to be outsourced one by one in a sequence,  ...  Two novel outsourcing algorithms for multiple bilinear pairings under the same security assumption are proposed in this paper.  ...  National Natural Science Foundation of China under grant 61802243, 61602232, 61572246, the Key R&D Program in industry field of Shaanxi Province under grant 2019GY-013, the Fundamental Research Funds for  ... 
dblp:journals/ijnsec/YangLR19 fatcat:rlgheem6mravtcgekzpjpuzny4

Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible

Haibo Tian, Fangguo Zhang, Kun Ren
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
And the result of the algorithm is checkable with a probability about 1/2. In this paper, we improve the stateof-the-art by proposing two new outsourcing algorithms for bilinear pairings.  ...  The increasing availability of cloud computing allows more and more mobile devices to outsource expensive computations.  ...  An algorithm under the OUP assumption usually needs more computations than under other assumptions. Most outsourcing algorithms for bilinear pairings are under the OUP assumption.  ... 
doi:10.1145/2714576.2714615 dblp:conf/ccs/TianZR15 fatcat:tldcvejahzczhe42vaf45bddta

Efficient and secure outsourcing of bilinear pairings with single server

Min Dong, Yanli Ren
2017 Science China Information Sciences  
Efficient and secure outsourcing of bilinear pairings with single server. Sci China Inf Sci, 2018, 61(3): 039104,  ...  The responsibility for scientific accuracy and content remains entirely with the authors.  ...  [6] first proposed an algorithm for outsourcing bilinear pair with one untrusted server, but the outsourcer was in-volved in some other complex computations in their algorithm, i.e., this algorithm  ... 
doi:10.1007/s11432-017-9161-2 fatcat:sioftx2zrbhvldmechy524a5je

New Algorithms for Secure Outsourcing of Modular Exponentiations [chapter]

Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou
2012 Lecture Notes in Computer Science  
Hohenberger and Lysyanskaya [33] presented the security model for outsourcing cryptographic computations, and proposed the first outsource-secure algorithm for modular exponentiations.  ...  In this paper, we propose a new secure outsourcing algorithm for exponentiation modular a prime in the one-malicious model.  ...  We are grateful to the anonymous referees for their invaluable suggestions.  ... 
doi:10.1007/978-3-642-33167-1_31 fatcat:swk5yo2xcvbk3jyephgrlwg5be

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou
2014 IEEE Transactions on Parallel and Distributed Systems  
Hohenberger and Lysyanskaya [33] presented the security model for outsourcing cryptographic computations, and proposed the first outsource-secure algorithm for modular exponentiations.  ...  In this paper, we propose a new secure outsourcing algorithm for exponentiation modular a prime in the one-malicious model.  ...  We are grateful to the anonymous referees for their invaluable suggestions.  ... 
doi:10.1109/tpds.2013.180 fatcat:vx4bvj7q25d55kmkb7iopnuxhu

New algorithms for verifiable outsourcing of bilinear pairings

Yanli Ren, Ning Ding, Tianyin Wang, Haining Lu, Dawu Gu
2016 Science China Information Sciences  
We propose a new outsourcing algorithm VBP for bilinear pairing, where T outsources its bilinear pairing computations to U 1 and U 2 by invoking the subroutine Rand.  ...  We also present the first outsourcing algorithm for multiple bilinear pairings.  ... 
doi:10.1007/s11432-016-5550-8 fatcat:7g4dywn5zbfatas3suy2wbscxu

Neighborhood-privacy protected shortest distance computing in cloud

Jun Gao, Jeffrey Xu Yu, Ruoming Jin, Jiashuai Zhou, Tengjiao Wang, Dongqing Yang
2011 Proceedings of the 2011 international conference on Management of data - SIGMOD '11  
This paper studies shortest distance computing in the cloud, which aims at the following goals: i) preventing outsourced graphs from neighborhood attack, ii) preserving shortest distances in outsourced  ...  With the advent of cloud computing, it becomes desirable to utilize cloud computing to efficiently process complex operations in large graphs without compromising their sensitive information.  ...  ACKNOWLEDGMENTS We would like to thank the anonymous reviewers for their helpful comments. We would like to thank Victor E. Lee for helping with the paper revision.  ... 
doi:10.1145/1989323.1989367 dblp:conf/sigmod/GaoYJZWY11 fatcat:qpqlcnkmnfboxg3rlilgfmqvmm

CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server

Shuai Li, Longxia Huang, Anmin Fu, John Yearwood
2017 Digital Communications and Networks  
In this paper, we propose a new algorithm for securing the outsourcing of composite modular exponentiation, which is one of the most complex computing tasks in discretelog based cryptographic protocols  ...  A B S T R A C T Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest.  ...  [9] provided a formal security definition for outsourcing computations, and proposed a secure outsourcing algorithm for exponentiation modulo a prime based on two non-colluding cloud servers.  ... 
doi:10.1016/j.dcan.2017.05.001 fatcat:ry6ybavzb5dzhee6nvmrmmhc6q

Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids

Feng Zhai, Ting Yang, Bing Zhao, Hao Chen
2022 Sensors  
In this paper, we combine data aggregation and the outsourcing of computations to design two privacy-preserving outsourcing algorithms for the modular exponentiation operations involved in the multi-dimensional  ...  data aggregation, which can allow these smart meter devices to delegate complex computation tasks to nearby servers for computing.  ...  We need to prove that pair one and pair two are computationally indistinguishable.  ... 
doi:10.3390/s22124365 pmid:35746148 pmcid:PMC9229731 fatcat:kyjobd5bqzbs3a4hk42wdu7vy4

Verifiable Outsourcing Computation of Modular Exponentiations with Single Server

Jianxing Cai, Yanli Ren, Tiejin Jiang
2017 International Journal of Network Security  
Verifiable computation (VC) allows a computationally weak client to outsource evaluation of a function on many inputs to a powerful but untrusted server.  ...  The experiments show that our algorithms are the implementations of secure and verifiable outsourcing for single modular exponentiation and simultaneous modular exponentiations.  ...  Outsourcing Algorithm Here we propose our algorithm SgExp for secure outsourcing of exponentiations.  ... 
dblp:journals/ijnsec/CaiRJ17 fatcat:a7dhsmfsajcxpi2gfcccziba3u

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption [article]

Charan Kumar, Dinesh Kumar, Arun Kumar Reddy
2014 arXiv   pre-print
Finally, we show an implementation scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.  ...  One.One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy  ...  Non-interactive Verifiable Computation: Noninteractive verifiable computation [19] , [20] enables a computationally weak client to outsource the computation of a function to one or more workers.  ... 
arXiv:1407.3660v1 fatcat:gcdrnkhkzbao3o5544exvkdmxe

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability

Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
Compared with the state-of-the-art algorithms, the proposed algorithms improve both checkability and efficiency for the outsourcer.  ...  We also present the other verifiable outsourcing algorithm for multiple modular exponentiations based on the same model.  ...  [17] presented the first security model for outsourcing cryptographic computations, and proposed the first outsource-secure algorithm for modular exponentiations.  ... 
doi:10.1145/2897845.2897881 dblp:conf/ccs/RenDZLG16 fatcat:cekttjg4y5ecfel76iz3iwr4ba
« Previous Showing results 1 — 15 out of 14,283 results