Filters








1,571 Hits in 3.1 sec

Speeding up Exponentiation using an Untrusted Computational Resource

Marten Van Dijk, Dwaine Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas
2006 Designs, Codes and Cryptography  
We present protocols for speeding up fixed-base exponentiation and variablebase exponentiation using an untrusted computation resource.  ...  We also describe how to use the protocols to construct protocols that do, with the aid of an untrusted resource, exponentiation modular an integer where the modulus is the product of primes with single  ...  Much of the previous work trying to speed up exponentiation using an untrusted resource, e.g.  ... 
doi:10.1007/s10623-005-3710-8 fatcat:abg6jxshsnbmtkp4enuhmeqo5a

CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server

Shuai Li, Longxia Huang, Anmin Fu, John Yearwood
2017 Digital Communications and Networks  
Unlike algorithms based on two untrusted servers, we outsource modular exponentiation operation to only a single server, which eliminates the potential for a collusion attack when using two servers.  ...  A B S T R A C T Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest.  ...  In CExp, T uses a subroutine called RandN [25] , which can speed up computations and reduce the computational overhead.  ... 
doi:10.1016/j.dcan.2017.05.001 fatcat:ry6ybavzb5dzhee6nvmrmmhc6q

How to Securely Outsource Cryptographic Computations [chapter]

Susan Hohenberger, Anna Lysyanskaya
2005 Lecture Notes in Computer Science  
We provide a formal security definition for securely outsourcing computations from a computationally limited device to an untrusted helper.  ...  The load reduces to O(log 2 n) for any exponentiation-based scheme where the honest device may use two untrusted exponentiation programs; we highlight the Cramer-Shoup cryptosystem [13] and Schnorr signatures  ...  We are grateful to Ron Rivest for many useful discussions and for suggesting the use of the generators in Section 3.2.  ... 
doi:10.1007/978-3-540-30576-7_15 fatcat:hk6awz63xvaczgci5ynl77vghu

Security challenges and opportunities in adaptive and reconfigurable hardware

Victor Costan, Srinivas Devadas
2011 2011 IEEE International Symposium on Hardware-Oriented Security and Trust  
We propose augmenting regular cloud servers with a Trusted Computation Base (TCB) that can securely perform high-performance computations.  ...  high performance and low cost that make cloud computing attractive in the first place.  ...  We thank Eran Tromer and Nickolai Zeldovich for useful discussions during the course of this work.  ... 
doi:10.1109/hst.2011.5954986 dblp:conf/host/CostanD11 fatcat:rewk7h5bubbxrhwpyr4wgo2j3u

When Agile Security Meets 5G

Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traore
2020 IEEE Access  
. s u j Number of untrusted VMs within the j th MEC site that are using resources of the back-up cloud. s t ij Number of trusted VMs that are using resources from the i th (1 ≤ i ≤ N S ) physical server  ...  For an untrusted user, the system additionally verifies the threshold condition, i.e., whether or not the number of untrusted user in the targeted computing node (edge server or back-up cloud) is below  ...  He is currently an Associate Editor of the IEEE Transactions on Information Forensics and Security (TIFS).  ... 
doi:10.1109/access.2020.3022741 fatcat:3tmvxqdxrnghxhcist7eg3l7qy

Multi Keyword Search on Encrypted Data with Ranking

Revati M Wahul
2021 International Journal for Research in Applied Science and Engineering Technology  
This approach can achieve linear computational complexity throughout the search process, spite of the fact that its size of the record set grows exponentially.  ...  The minimum hash sub-tree structure is used in this paper to check the validity of search results.  ...  To speed up the server-side searching process, we proposed the MRSE-HCI architecture.  ... 
doi:10.22214/ijraset.2021.36672 fatcat:7tb2uvliq5e7rirdfvtnuobmei

A Brief Survey on Perils of Data Storage in Cloud

Dr. S. Veena
2019 International Journal for Research in Applied Science and Engineering Technology  
With the dominance of technology, the size of the data is increasing exponentially day by day. Cloud computing serves as an exceptional solution for storage of this rapidly growing data.  ...  Cloud computing technology evolves the delivery of computing services such as servers, storage, databases, networks, software, analytics and many more.  ...  Cloud makes use of virtualized resources to access the pool of resources that are available over the internet. Cloud exhibits various features such as speed, efficiency, flexibility and scalability.  ... 
doi:10.22214/ijraset.2019.3123 fatcat:ict6zmgj6fcy5jbmkg5t3nzhzq

Efficient and verifiable algorithms for secure outsourcing of cryptographic computations

Mehmet Sabır Kiraz, Osmanbey Uzunkol
2015 International Journal of Information Security  
Reducing the computational cost of cryptographic computations for resource-constrained devices is an active research area.  ...  Our algorithms are the most efficient outsourced computation algorithms using a single untrusted server.  ...  Note that these blinding factors are computed in order to speed up computations [1, 2] .  ... 
doi:10.1007/s10207-015-0308-7 fatcat:k25oc3midrfzhcsd7ysod65oim

Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains

Giulio Galiero, Gabriele Giammatteo
2009 Identity in the Information Society  
The proposed approach extends the existing solutions by providing two additional features: (1) the encryption can also be delegated to a pool of remote trusted computing resources, and (2) the definition  ...  Since users' data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains.  ...  Authors especially thank the GILDA support team for the performance tests, their colleague Isabel Matranga for the proof reading work and all the Distributed Computing team at Engineering Ingegneria Informatica  ... 
doi:10.1007/s12394-009-0033-3 fatcat:i66mcvcbsjcwjaqrhvivs6bgea

Verified Query Results from Hybrid Authentication Trees [chapter]

Glen Nuckolls
2005 Lecture Notes in Computer Science  
We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner.  ...  A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications.  ...  An efficient quasi-commutative accumulator without a trapdoor would speed up our verification time.  ... 
doi:10.1007/11535706_7 fatcat:bgca7koh3rbw3gkmghsbzp7ipa

SuperWeb: research issues in Java-based global computing

Albert D. Alexandrov, Maximilian Ibel, Klaus E. Schauser, Chris J. Scheiman
1997 Concurrency Practice and Experience  
We examine an economic model for trading computing resources, and discuss several technical challenges associated with such a global computing environment.  ...  Hosts register a fraction of their computing resources (CPU time, memory, bandwidth, disk space) with resource brokers. Clients submit tasks that need to be executed.  ...  Computational resources were provided by NSF Instrumentation Grant CDA-9216202, NSF Infrastructure Grant CDA-9529418 and Sun Microsystems.  ... 
doi:10.1002/(sici)1096-9128(199706)9:6<535::aid-cpe307>3.0.co;2-1 fatcat:soy7rrweuvfqhlr2p7uwypi6lm

A Study of Reconfigurable Accelerators for Cloud Computing

Noor Mohammedali, Michael Opoku Agyeman
2018 Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control - ISCSIC '18  
This paper looks at FPGAs as reconfigurable accelerators for the cloud computing presents the main hardware accelerators that have been presented in various widely used cloud computing applications such  ...  Due to the exponential increase in network traffic in the data centers, thousands of servers interconnected with high bandwidth switches are required.  ...  In short, in conventional Spark they achieved up to 50 times speed up and in GPU-accelerated Spark they achieved 10 times speed.  ... 
doi:10.1145/3284557.3284563 fatcat:chmip5oxmjcdnmjde2g52fxg4i

Securely Outsource Modular Exponentiations with Single Untrusted Cloud Server

Dezhi An, Yan Li, Shengcai Zhang, Jun Lu
2020 IEEE Access  
Due to the heavy computation cost of modular exponentiation, many schemes have been put forward to securely outsource modular exponentiation to cloud.  ...  INDEX TERMS Cloud computing, Outsource-secure algorithm, Modular exponentiations, Single server VOLUME 4, 2016  ...  RAN D ALGORITHM The subroutine Rand is used to expedite calculation the speed of scheme [3] .  ... 
doi:10.1109/access.2020.3033306 fatcat:fzuayuuib5ggbldng7sngpb6p4

The persistent relevance of the local operating system to global applications

Jay Lepreau, Bryan Ford, Mike Hibler
1996 Proceedings of the 7th workshop on ACM SIGOPS European workshop Systems support for worldwide applications - EW 7  
In this paper we outline the supporting arguments for these views and describe an OS design that supports secure encapsulation of the foreign processes that will be increasingly prevalent in tomorrow's  ...  We believe we have developed an operating system architecture that can efficiently address that demand for isolation and resource control.  ...  In the area of isolation and resource management, it places new demands.  ... 
doi:10.1145/504475.504477 fatcat:ofcq3qd3m5d77bx5bwowbz2iam

The persistent relevance of the local operating system to global applications

Jay Lepreau, Bryan Ford, Mike Hibler
1996 Proceedings of the 7th workshop on ACM SIGOPS European workshop Systems support for worldwide applications - EW 7  
In this paper we outline the supporting arguments for these views and describe an OS design that supports secure encapsulation of the foreign processes that will be increasingly prevalent in tomorrow's  ...  We believe we have developed an operating system architecture that can efficiently address that demand for isolation and resource control.  ...  In the area of isolation and resource management, it places new demands.  ... 
doi:10.1145/504450.504477 dblp:conf/sigopsE/LepreauFH96 fatcat:afedmsh5azdglnazf7pvapgtxa
« Previous Showing results 1 — 15 out of 1,571 results