Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation

The security is an important issue of affecting the wide applications for Internet of Things(IoT). The security of IoT is mainly based on cryptographic algorithms. Bilinear pairing, as a basic operation, is widely used in many cryptographic algorithms such as identity-based cryptographic algorithms. However, it is difficult to directly run bilinear pairing on the IoT devices because the bilinear pairing is very time-consuming. In this paper, we explore how to achieve securelatex XX.texly outsourcing bilinear pairings for IoT devices. We design an efficient algorithm that outsources the bilinear pairing in the one-malicious version of two untrusted program model for resource-limited IoT devices. Different from previous algorithms, the designed algorithm does not require client store large-scale pre-computation results, while still keeps high computational efficiency on the client side. The detailed security analysis and experiment results show the practicability of our design.

[1]  Zhenxing Qian,et al.  Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server , 2018 .

[2]  Yael Tauman Kalai,et al.  Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..

[3]  Sébastien Canard,et al.  Toward Generic Method for Server-Aided Cryptography , 2013, ICICS.

[4]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[5]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.

[6]  Zvika Brakerski,et al.  Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.

[7]  Karen S. Phillips,et al.  Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates , 2018 .

[8]  David Naccache,et al.  Secure Delegation of Elliptic-Curve Pairing , 2010, IACR Cryptol. ePrint Arch..

[9]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[10]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[11]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[12]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[13]  Yanli Ren,et al.  Efficient and secure outsourcing of bilinear pairings with single server , 2017, Science China Information Sciences.

[14]  Anna Lysyanskaya,et al.  How to Securely Outsource Cryptographic Computations , 2005, TCC.

[15]  Jia Yu,et al.  Strong Key-Exposure Resilient Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Jianfeng Ma,et al.  Efficient algorithms for secure outsourcing of bilinear pairings , 2015, Theor. Comput. Sci..

[17]  V. Goutham,et al.  Enabling Cloud Storage Auditing with Key Exposure Resistance , 2016 .

[18]  Philippe Golle,et al.  Uncheatable Distributed Computations , 2001, CT-RSA.