Cryptanalysis of Modular Exponentiation Outsourcing Protocols

نویسندگان

چکیده

Abstract Public-key cryptographic primitives are time consuming for resource-constrained devices. A classical problem is to securely offload group exponentiations from a (comparatively) weak device—the client—to an untrusted more powerful server. delegation protocol must usually meet two security objectives: privacy—the exponent or the base should not be revealed passive adversary—and verifiability—a malicious server able make client accept invalid value as result of delegated computation. Most proposed protocols relies on secret splitting and base, considerable amount literature has been devoted their analysis. Recently, Su et al. (Su, Q., Zhang, R. Xue, (2020) Secure outsourcing algorithms composite modular exponentiation based single cloud. Comput. J., 63, 1271.) Rangasamy Kuppusamy (Rangasamy, J. Kuppusamy, L. (2018) Revisiting Single-Server Algorithms Outsourcing Modular Exponentiation. In Chakraborty, D. Iwata, T. (eds), Progress in Cryptology - INDOCRYPT 2018: 19th International Conference India, New Delhi, December 912, Vol. 11356, Lecture Notes Computer Science. Springer, Heidelberg, Germany, pp. 320. exponentiations. They claim that achieve (privacy verifiability). We show these claims flawed schemes broken beyond repair. remain insecure even if one increases significantly parameters (and consequently computational communication complexities). Our attacks rely standard lattice-based cryptanalytic techniques, namely Coppersmith methods find small integer zeroes multivariate polynomials simultaneous Diophantine approximation so-called approximate greatest common divisor problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation

Automatic methods developed so far for analysis of security protocols only model a limited set of cryptographic primitives (often, only encryption and concatenation) and abstract from low-level features of cryptographic algorithms. This paper is an attempt towards closing this gap. We propose a symbolic technique and a decision method for analysis of protocols based on modular exponentiation, s...

متن کامل

Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

We address the problem of speeding up group computations in cryptography using a single untrusted computational resource. We analyze the security of an efficient protocol for securely outsourcing multiexponentiations proposed at ESORICS 2014. We show that this scheme does not achieve the claimed security guarantees and we present several practical polynomial-time attacks on the delegation proto...

متن کامل

Fast quantum modular exponentiation

concurrent architecture, NTC, neighbor-only, two-qubit gate, concurrent architecture; and Perf, performance relative to VBE algorithm for that architecture, based on CCNOTs for AC and CNOTs for NTC.

متن کامل

FPGA Implementation of Modular Exponentiation

An e cient implementations of the main building block in the RSA cryptographic scheme is achieved by mapping a bit-level systolic array for modular exponentiation onto Xilinx FPGAs. One XC6000 chip, or 4 Kgates accommodates 132-bit long integers. 16 Kgates is required for modular exponentiation of 512 bit keys, with the estimated bit rate 800 Kb/sec. 1 Systolic Array for Modular Exponentiation ...

متن کامل

Fast Modular Exponentiation

The well-known binary method computes C = M (mod N) using an average number of 1:5(n 1) multiplications, where n is the number of bits in the binary expansion of E. When the exponent is recoded using the canonical bit recoding technique then the average number of multiplications can be reduced to 1:33(n 1). We show that a further reduction is achieved if the bits of the exponent are scanned at ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Computer Journal

سال: 2021

ISSN: ['0010-4620', '1460-2067']

DOI: https://doi.org/10.1093/comjnl/bxab066