Chrome Extension
WeChat Mini Program
Use on ChatGLM

Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications

IEEE Internet of Things Journal(2021)

Cited 8|Views11
No score
Abstract
Modular exponentiation, an operation widely utilized in cryptographic protocols to transfer text and other forms of data, can also be applied to Internet-of-Things (IoT) devices with high security requirements. However, due to the high resource consumption of modular exponentiation, IoT devices can face the problem of resource insufficient. Fortunately, the secure outsourcing scheme offers a new solution for resource-constrained devices. In this article, we apply a parallel secure outsourcing scheme to provide the possibility for modular exponentiation operation, which is used in the IoT devices. After that, the task of modular exponentiation is decomposed and we introduce the scheme in more detail. In addition, based on this scheme, we designed an extension scheme for RSA, providing enhanced security for IoT devices. Finally, the analysis of experimental results based on 512-4096 b of data indicates the superiority in scalability and time consumption over the previous schemes.
More
Translated text
Key words
Outsourcing,Servers,Cloud computing,Task analysis,Cryptography,Internet of Things,Cloud computing,Internet of Things (IoT),modular exponentiation,parallel algorithm,secure outsourcing
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined