Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields
Cloud computing gives resource-constrained clients great conveniences to outsource
exorbitant computations to a public cloud. The extended Euclidean algorithm with large …
exorbitant computations to a public cloud. The extended Euclidean algorithm with large …
Efficient and secure outsourcing scheme for RSA decryption in Internet of Things
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …
Efficient algorithm for secure outsourcing of modular exponentiation with single server
Outsourcing computation allows an outsourcer with limited resource to delegate the
computation load to a powerful server without the exposure of true inputs and outputs. It is …
computation load to a powerful server without the exposure of true inputs and outputs. It is …
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server
Outsourcing computing allows users with resource-constrained devices to outsource their
complex computation workloads to cloud servers, which is more economical for cloud …
complex computation workloads to cloud servers, which is more economical for cloud …
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server
Modular exponentiation is an expensive discrete-logarithm operation, difficult for resource-
constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing …
constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing …
Privacy-preserving data sharing scheme over cloud for social applications
Social applications are becoming one of the most popular applications for users to share
data and communicate online. These applications deal with a lot of personal data, eg, users' …
data and communicate online. These applications deal with a lot of personal data, eg, users' …
Secure outsourcing of large matrix determinant computation
J Liu, J Bi, M Li - Frontiers of Computer Science, 2020 - Springer
Cloud computing provides the capability to connect resource-constrained clients with a
centralized and shared pool of resources, such as computational power and storage on …
centralized and shared pool of resources, such as computational power and storage on …
Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation
A Abadi - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Repeated modular squaring plays a crucial role in various time-based cryptographic
primitives, such as Time-Lock Puzzles and Verifiable Delay Functions. At ACM CCS 2021 …
primitives, such as Time-Lock Puzzles and Verifiable Delay Functions. At ACM CCS 2021 …
Secure fully-verifiable outsourcing of modular exponentiation: two servers check each other
With the fast development of cloud computing, clients without enough computational power
can widely outsource their heavy computations to cloud service providers. One of the most …
can widely outsource their heavy computations to cloud service providers. One of the most …