Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server

Modular exponentiation is an expensive discrete-logarithm operation, difficult for resource-constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing, users are willing to securely outsourcing modular exponentiations to cloud servers to reduce computation overhead. In this paper, we contrive a fully verifiable secure outsourcing scheme for modular exponentiation with only a single server, named MExp. MExp not only prevents users’ private information leakage during outsourcing by our new logical division method, but also eliminates collusion attacks occurring in algorithms with two untrusted servers. Moreover, our MExp allows outsourcers to detect any misbehavior with a probability of 1, which shows significant improvement in checkability when compare to other single-server-based schemes. With a view to reducing computation overhead, MExp is extended to multiple modular exponentiations, named M2Exp. The algorithm significantly diminishes the local costs of multiple modular exponentiation calculations and the checkability is still 1. Compared with existing state-of-the-art schemes, MExp and M2Exp have outstanding performance in both efficiency and checkability. Finally, MExp and M2Exp are applied to Cramer–Shoup encryptions and Schnorr signatures.

[1]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Abdullah Gani,et al.  A survey on indexing techniques for big data: taxonomy and performance evaluation , 2016, Knowledge and Information Systems.

[3]  Kim-Kwang Raymond Choo,et al.  Secure outsourcing of modular exponentiations under single untrusted programme model , 2017, J. Comput. Syst. Sci..

[4]  Ming Xu,et al.  Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations , 2016, 2016 IEEE International Conference on Communications (ICC).

[5]  Lu Zhou,et al.  Efficiently and securely harnessing cloud to solve linear regression and other matrix operations , 2018, Future Gener. Comput. Syst..

[6]  W. Ford,et al.  Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption , 2000 .

[7]  Hui Li,et al.  Verifiable algorithm for outsourced database with updating , 2017, Cluster Computing.

[8]  Zheng Xu,et al.  Secure outsourcing of modular exponentiations in cloud and cluster computing , 2016, Cluster Computing.

[9]  Enzo Baccarelli,et al.  Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications , 2018, The Journal of Supercomputing.

[10]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..

[11]  Céline Chevalier,et al.  Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions , 2016, Algorithmica.

[12]  Gang Xu,et al.  Delegation of Computation with Verification Outsourcing: Curious Verifiers , 2017, IEEE Trans. Parallel Distributed Syst..

[13]  Anmin Fu,et al.  DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems , 2018, J. Netw. Comput. Appl..

[14]  Xiaojiang Du,et al.  An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing , 2017, 2017 IEEE International Conference on Communications (ICC).

[15]  Anna Lysyanskaya,et al.  How to Securely Outsource Cryptographic Computations , 2005, TCC.

[16]  Shahaboddin Shamshirband,et al.  A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach , 2015, Journal of Grid Computing.

[17]  Xinpeng Zhang,et al.  Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability , 2016, AsiaCCS.

[18]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[19]  Lakshmi Kuppusamy,et al.  CRT-Based Outsourcing Algorithms for Modular Exponentiations , 2016, INDOCRYPT.

[20]  Jin Li,et al.  Outsourcing computation of modular exponentiations in cloud computing , 2013, Cluster Computing.

[21]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[22]  Guo Xian-jiu Cryptanalysis and improvement of several certificateless digital signature schemes , 2008 .

[23]  Anmin Fu,et al.  NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users , 2017, IEEE Transactions on Big Data.

[24]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[25]  Mauro Conti,et al.  RARE: Defeating side channels based on data-deduplication in cloud storage , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[26]  Anmin Fu,et al.  Privacy-preserving public auditing for non-manager group , 2017, 2017 IEEE International Conference on Communications (ICC).

[27]  Ronald Cramer,et al.  A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.

[28]  Zhen Liu,et al.  Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage , 2014, ESORICS.

[29]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[30]  Anthony T. Chronopoulos,et al.  Introducing ToPe‐FFT: An OpenCL‐based FFT library targeting GPUs , 2017, Concurr. Comput. Pract. Exp..

[31]  Ahmad Sharieh,et al.  Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures , 2017, The Journal of Supercomputing.

[32]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[33]  Osmanbey Uzunkol,et al.  Efficient and verifiable algorithms for secure outsourcing of cryptographic computations , 2015, International Journal of Information Security.

[34]  Xiaofeng Liao,et al.  Securely and efficiently perform large matrix rank decomposition computation via cloud computing , 2015, Cluster Computing.

[35]  Jianfeng Ma,et al.  An Improved Algorithm for Secure Outsourcing of Modular Exponentiations , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[36]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[37]  Jinguang Han,et al.  VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud , 2020, IEEE Transactions on Services Computing.

[38]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[39]  Mohammad Shojafar,et al.  FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..

[40]  Ximeng Liu,et al.  An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.

[41]  Chunming Tang,et al.  Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server , 2015, J. Ambient Intell. Humaniz. Comput..

[42]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[43]  John Yearwood,et al.  CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server , 2017, Digit. Commun. Networks.

[44]  G. Edward Suh,et al.  Speeding up Exponentiation using an Untrusted Computational Resource , 2006, Des. Codes Cryptogr..

[45]  Yutao Ma,et al.  Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey , 2017, IEEE Network.