Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
- Submitting institution
-
De Montfort University
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 11192
- Type
- D - Journal article
- DOI
-
10.1007/s10207-015-0308-7
- Title of journal
- International Journal of Information Security
- Article number
- -
- First page
- 519
- Volume
- 15
- Issue
- 5
- ISSN
- 1615-5262
- Open access status
- Out of scope for open access requirements
- Month of publication
- -
- Year of publication
- 2015
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
1
- Research group(s)
-
-
- Citation count
- 20
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- Today's resource-constrained devices are often incapable of computing expensive cryptographic operations. This researchproposes the most efficient outsourcing algorithms for modular exponentiations using only one untrusted cloud server. These algorithms cover public/private base and exponent, and simultaneous modular exponentiations.This research has proven influential on others’ research ( 10.1109/TIFS.2017.2710941; 10.1016/j.jnca.2018.06.003; 10.1109/JIOT.2020.2995677).
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -