Title : 
A New Algorithm for Secure Outsourcing Composite Modular Exponentiation
         
        
            Author : 
Jie Liu ; Bo Yang
         
        
            Author_Institution : 
Coll. of Inf., South China Agric. Univ., Guangzhou, China
         
        
        
        
        
        
            Abstract : 
Modular exponentiations are widely used in discrete-log based cryptographic protocols. Most researches have been done for outsourcing exponentiation modular a prime, while less work has been done for outsourcing exponentiation modular a composite. In this paper, we first raise a new secure outsourcing algorithm for exponentiation modular a composite in the one malicious model. Then, we prove that this algorithm is secure in the one-malicious model and give efficiency analysis later. Comparing with other algorithms, ours is more efficient for composite modular exponentiation. Finally, we use this algorithm to realize a outsource-secure algorithm for Shamir´s Identitybased Signature scheme.
         
        
            Keywords : 
cryptographic protocols; digital signatures; outsourcing; discrete-log based cryptographic protocols; efficiency analysis; identity-based signature scheme; malicious model; outsource-secure algorithm; secure composite modular exponentiation outsourcing; Algorithm design and analysis; Computational modeling; Cryptography; Gold; Outsourcing; Software; Cloud computation; Modular exponentiation; Outsourcing computation;
         
        
        
        
            Conference_Titel : 
Information Science and Control Engineering (ICISCE), 2015 2nd International Conference on
         
        
            Conference_Location : 
Shanghai
         
        
            Print_ISBN : 
978-1-4673-6849-0
         
        
        
            DOI : 
10.1109/ICISCE.2015.107