Novel secure outsourcing of modular inversion for arbitrary and variable modulus

In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations...

Full description

Saved in:
Bibliographic Details
Main Authors: TIAN, Chengliang, YU, Jia, ZHANG, Hanlin, XUE, Haiyang, WANG, Cong, REN, Kui
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2022
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9197
https://ink.library.smu.edu.sg/context/sis_research/article/10202/viewcontent/08812923.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10202
record_format dspace
spelling sg-smu-ink.sis_research-102022024-08-13T05:12:55Z Novel secure outsourcing of modular inversion for arbitrary and variable modulus TIAN, Chengliang YU, Jia ZHANG, Hanlin XUE, Haiyang WANG, Cong REN, Kui In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results returned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-client’s computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given. 2022-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9197 info:doi/10.1109/tsc.2019.2937486 https://ink.library.smu.edu.sg/context/sis_research/article/10202/viewcontent/08812923.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Outsourcing Servers Cloud Computing Computational Modeling Task Analysis Cryptography Cloud Computing Modular Inversion Unimodular Matrix Transformation Efficiency Privacy Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Outsourcing
Servers
Cloud Computing
Computational Modeling
Task Analysis
Cryptography
Cloud Computing
Modular Inversion
Unimodular Matrix Transformation
Efficiency
Privacy
Information Security
spellingShingle Outsourcing
Servers
Cloud Computing
Computational Modeling
Task Analysis
Cryptography
Cloud Computing
Modular Inversion
Unimodular Matrix Transformation
Efficiency
Privacy
Information Security
TIAN, Chengliang
YU, Jia
ZHANG, Hanlin
XUE, Haiyang
WANG, Cong
REN, Kui
Novel secure outsourcing of modular inversion for arbitrary and variable modulus
description In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results returned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-client’s computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given.
format text
author TIAN, Chengliang
YU, Jia
ZHANG, Hanlin
XUE, Haiyang
WANG, Cong
REN, Kui
author_facet TIAN, Chengliang
YU, Jia
ZHANG, Hanlin
XUE, Haiyang
WANG, Cong
REN, Kui
author_sort TIAN, Chengliang
title Novel secure outsourcing of modular inversion for arbitrary and variable modulus
title_short Novel secure outsourcing of modular inversion for arbitrary and variable modulus
title_full Novel secure outsourcing of modular inversion for arbitrary and variable modulus
title_fullStr Novel secure outsourcing of modular inversion for arbitrary and variable modulus
title_full_unstemmed Novel secure outsourcing of modular inversion for arbitrary and variable modulus
title_sort novel secure outsourcing of modular inversion for arbitrary and variable modulus
publisher Institutional Knowledge at Singapore Management University
publishDate 2022
url https://ink.library.smu.edu.sg/sis_research/9197
https://ink.library.smu.edu.sg/context/sis_research/article/10202/viewcontent/08812923.pdf
_version_ 1814047788383600640