Advertisement

Outsourcing Modular Exponentiation in Cryptographic Web Applications

  • Pascal Mainini
  • Rolf HaenniEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10958)

Abstract

Modern web applications using advanced cryptographic methods may need to calculate a large number of modular exponentiations. Performing such calculations in the web browser efficiently is a known problem. We propose a solution to this problem based on outsourcing the computational effort to untrusted exponentiation servers. We present several efficient outsourcing protocols for different settings and a practical implementation consisting of a JavaScript client library and a server application. Compared to browser-only computation, our solution improves the overall computation time by an order of magnitude.

Notes

Acknowledgment

We thank the anonymous reviewers for their thorough reviews. We appreciated their valuable comments and suggestions.

References

  1. 1.
    Cavallo, B., Di Crescenzo, G., Kahrobaei, D., Shpilrain, V.: Efficient and secure delegation of group exponentiation to a single server. In: Mangard, S., Schaumont, P. (eds.) RFIDSec 2015. LNCS, vol. 9440, pp. 156–173. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-24837-0_10CrossRefGoogle Scholar
  2. 2.
    Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)CrossRefGoogle Scholar
  3. 3.
    Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016, Part I. LNCS, vol. 9878, pp. 261–278. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-45744-4_13CrossRefGoogle Scholar
  4. 4.
    Fielding, R.T.: Architectural Styles and the Design of Network-Based Software Architectures. Ph.D. thesis, University of California, Irvine, USA (2000)Google Scholar
  5. 5.
    Galindo, D., Guasch, S., Puiggalí, J.: 2015 Neuchâtel’s cast-as-intended verification mechanism. In: Haenni, R., Koenig, R.E., Wikström, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 3–18. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-22270-7_1CrossRefGoogle Scholar
  6. 6.
    Haenni, R., Koenig, R.E., Dubuis, E.: Cast-as-intended verification in electronic elections based on oblivious transfer. In: Krimmer, R., et al. (eds.) E-Vote-ID 2016. LNCS, vol. 10141, pp. 73–91. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-52240-1_5CrossRefGoogle Scholar
  7. 7.
    Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264–282. Springer, Heidelberg (2005).  https://doi.org/10.1007/978-3-540-30576-7_15CrossRefGoogle Scholar
  8. 8.
    Kiraz, M.S., Uzunkol, O.: Efficient and verifiable algorithms for secure outsourcing of cryptographic computations. Int. J. Inf. Secur. 15(5), 519–537 (2016)CrossRefGoogle Scholar
  9. 9.
    Locher, P., Haenni, R.: Verifiable internet elections with everlasting privacy and minimal trust. In: Haenni, R., Koenig, R.E., Wikström, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 74–91. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-22270-7_5CrossRefGoogle Scholar
  10. 10.
    Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Comput. 16(4), 787–796 (2013)CrossRefGoogle Scholar
  11. 11.
    Mainini, P.: Efficient and Secure Outsourcing of Modular Exponentiation. Bachelor thesis, Bern University of Applied Sciences, Biel, Switzerland (2017)Google Scholar
  12. 12.
    Ye, J., Chen, X., Ma, J.: An improved algorithm for secure outsourcing of modular exponentiations. In: 29th International Conference on Advanced Information Networking and Applications Workshops, AINA 2015, Gwangju, Korea, pp. 73–76 (2015)Google Scholar

Copyright information

© International Financial Cryptography Association 2019

Authors and Affiliations

  1. 1.Bern University of Applied SciencesBiel/BienneSwitzerland

Personalised recommendations