期刊论文详细信息
Journal of mathematical cryptology
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
article
Giovanni Di Crescenzo1  Matluba Khodjaeva2  Delaram Kahrobaei3  Vladimir Shpilrain4 
[1] Perspecta Labs Inc. Basking Ridge, United States of America;CUNY John Jay College of Criminal Justice. New York, United States of America;University of York. Heslington, United Kingdom;City University of New York. New, United States of America
关键词: Secure Delegation;    Modular Exponentiations;    Discrete Logarithms;    Cryptography;    Group Theory;    Elliptic Curves;   
DOI  :  10.1515/jmc-2019-0036
学科分类:社会科学、人文和艺术(综合)
来源: De Gruyter
PDF
【 摘 要 】

Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of performing a relatively small number of modular multiplications) delegates such primitive operations to a computationally stronger server. Important requirements for such delegation protocols include privacy of the client’s input exponent and security of the client’s output, in the sense of detecting, except for very small probability, any malicious server’s attempt to convince the client of an incorrect exponentiation result. Only recently, efficient protocols for the delegation of a fixed-based exponentiation, over cyclic and RSA-type groups with certain properties, have been presented and proved to satisfy both requirements. In this paper we show that a product of many fixed-base exponentiations, over a cyclic groups with certain properties, can be privately and securely delegated by keeping the client’s online number of modular multiplications only slightly larger than in the delegation of a single exponentiation. We use this result to show the first delegations of entire cryptographic schemes: the well-known digital signature schemes by El-Gamal, Schnorr and Okamoto, over the q -order subgroup in ℤ p , for p , q primes, as well as their variants based on elliptic curves. Previous efficient delegation results were limited to the delegation of single algorithms within cryptographic schemes.

【 授权许可】

CC BY|CC BY-NC-ND   

【 预 览 】
附件列表
Files Size Format View
RO202107200005205ZK.pdf 883KB PDF download
  文献评价指标  
  下载次数:0次 浏览次数:5次