Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things

H Zhang, J Yu, C Tian, G Xu, P Gao… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields

Q Zhou, C Tian, H Zhang, J Yu, F Li - Information Sciences, 2020 - Elsevier
Cloud computing gives resource-constrained clients great conveniences to outsource
exorbitant computations to a public cloud. The extended Euclidean algorithm with large …

Efficient and secure outsourcing scheme for RSA decryption in Internet of Things

H Zhang, J Yu, C Tian, L Tong, J Lin… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …

Efficient algorithm for secure outsourcing of modular exponentiation with single server

Y Ren, M Dong, Z Qian, X Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Outsourcing computation allows an outsourcer with limited resource to delegate the
computation load to a powerful server without the exposure of true inputs and outputs. It is …

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server

A Fu, S Li, S Yu, Y Zhang, Y Sun - Journal of Network and Computer …, 2018 - Elsevier
Outsourcing computing allows users with resource-constrained devices to outsource their
complex computation workloads to cloud servers, which is more economical for cloud …

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server

A Fu, Y Zhu, G Yang, S Yu, Y Yu - Cluster Computing, 2018 - Springer
Modular exponentiation is an expensive discrete-logarithm operation, difficult for resource-
constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing …

Privacy-preserving data sharing scheme over cloud for social applications

C Lyu, SF Sun, Y Zhang, A Pande, H Lu… - Journal of Network and …, 2016 - Elsevier
Social applications are becoming one of the most popular applications for users to share
data and communicate online. These applications deal with a lot of personal data, eg, users' …

Secure outsourcing of large matrix determinant computation

J Liu, J Bi, M Li - Frontiers of Computer Science, 2020 - Springer
Cloud computing provides the capability to connect resource-constrained clients with a
centralized and shared pool of resources, such as computational power and storage on …

Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation

A Abadi - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Repeated modular squaring plays a crucial role in various time-based cryptographic
primitives, such as Time-Lock Puzzles and Verifiable Delay Functions. At ACM CCS 2021 …

Secure fully-verifiable outsourcing of modular exponentiation: two servers check each other

O Torki, H Mala, M Ashouri-Talouki - The Journal of Supercomputing, 2025 - Springer
With the fast development of cloud computing, clients without enough computational power
can widely outsource their heavy computations to cloud service providers. One of the most …