Novel secure outsourcing of modular inversion for arbitrary and variable modulus
In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9197 https://ink.library.smu.edu.sg/context/sis_research/article/10202/viewcontent/08812923.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-10202 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-102022024-08-13T05:12:55Z Novel secure outsourcing of modular inversion for arbitrary and variable modulus TIAN, Chengliang YU, Jia ZHANG, Hanlin XUE, Haiyang WANG, Cong REN, Kui In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results returned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-client’s computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given. 2022-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9197 info:doi/10.1109/tsc.2019.2937486 https://ink.library.smu.edu.sg/context/sis_research/article/10202/viewcontent/08812923.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Outsourcing Servers Cloud Computing Computational Modeling Task Analysis Cryptography Cloud Computing Modular Inversion Unimodular Matrix Transformation Efficiency Privacy Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Outsourcing Servers Cloud Computing Computational Modeling Task Analysis Cryptography Cloud Computing Modular Inversion Unimodular Matrix Transformation Efficiency Privacy Information Security |
spellingShingle |
Outsourcing Servers Cloud Computing Computational Modeling Task Analysis Cryptography Cloud Computing Modular Inversion Unimodular Matrix Transformation Efficiency Privacy Information Security TIAN, Chengliang YU, Jia ZHANG, Hanlin XUE, Haiyang WANG, Cong REN, Kui Novel secure outsourcing of modular inversion for arbitrary and variable modulus |
description |
In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results returned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-client’s computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given. |
format |
text |
author |
TIAN, Chengliang YU, Jia ZHANG, Hanlin XUE, Haiyang WANG, Cong REN, Kui |
author_facet |
TIAN, Chengliang YU, Jia ZHANG, Hanlin XUE, Haiyang WANG, Cong REN, Kui |
author_sort |
TIAN, Chengliang |
title |
Novel secure outsourcing of modular inversion for arbitrary and variable modulus |
title_short |
Novel secure outsourcing of modular inversion for arbitrary and variable modulus |
title_full |
Novel secure outsourcing of modular inversion for arbitrary and variable modulus |
title_fullStr |
Novel secure outsourcing of modular inversion for arbitrary and variable modulus |
title_full_unstemmed |
Novel secure outsourcing of modular inversion for arbitrary and variable modulus |
title_sort |
novel secure outsourcing of modular inversion for arbitrary and variable modulus |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2022 |
url |
https://ink.library.smu.edu.sg/sis_research/9197 https://ink.library.smu.edu.sg/context/sis_research/article/10202/viewcontent/08812923.pdf |
_version_ |
1814047788383600640 |