TY - JOUR
T1 - Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
AU - Hu, Qilin
AU - Duan, Mingxing
AU - Yang, Zhibang
AU - Yu, Siyang
AU - Xiao, Bin
N1 - Funding Information:
This work was supported by the Natural Science Foundation of China under Grant 61872129
Funding Information:
Manuscript received March 31, 2020; revised June 29, 2020 and August 26, 2020; accepted October 1, 2020. Date of publication October 6, 2020; date of current version August 6, 2021. This work was supported in part by NSFC under Grant 61902119, Grant 61802032, and Grant 61772182; in part by the China Postdoctoral Science Foundation under Grant 2019M652758 and Grant 2019TQ0087; in part by the Key Area Research Program of Hunan under Grant 2019GK2091; in part by the Hunan Province Key Laboratory of Industrial Internet Technology and Security under Grant 2019TP1011; and in part by the Outstanding Youth of Department of Education of Hunan Province under Grant 18B483. (Corresponding authors: Mingxing Duan; Zhibang Yang.) Qilin Hu and Mingxing Duan are with the College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China (e-mail: qlhu@hnu.edu.cn; duanmingxing@hnu.edu.cn).
Publisher Copyright:
© 2014 IEEE.
PY - 2021/8/15
Y1 - 2021/8/15
N2 - Modular exponentiation, an operation widely utilized in cryptographic protocols to transfer text and other forms of data, can also be applied to Internet-of-Things (IoT) devices with high security requirements. However, due to the high resource consumption of modular exponentiation, IoT devices can face the problem of resource insufficient. Fortunately, the secure outsourcing scheme offers a new solution for resource-constrained devices. In this article, we apply a parallel secure outsourcing scheme to provide the possibility for modular exponentiation operation, which is used in the IoT devices. After that, the task of modular exponentiation is decomposed and we introduce the scheme in more detail. In addition, based on this scheme, we designed an extension scheme for RSA, providing enhanced security for IoT devices. Finally, the analysis of experimental results based on 512-4096 b of data indicates the superiority in scalability and time consumption over the previous schemes.
AB - Modular exponentiation, an operation widely utilized in cryptographic protocols to transfer text and other forms of data, can also be applied to Internet-of-Things (IoT) devices with high security requirements. However, due to the high resource consumption of modular exponentiation, IoT devices can face the problem of resource insufficient. Fortunately, the secure outsourcing scheme offers a new solution for resource-constrained devices. In this article, we apply a parallel secure outsourcing scheme to provide the possibility for modular exponentiation operation, which is used in the IoT devices. After that, the task of modular exponentiation is decomposed and we introduce the scheme in more detail. In addition, based on this scheme, we designed an extension scheme for RSA, providing enhanced security for IoT devices. Finally, the analysis of experimental results based on 512-4096 b of data indicates the superiority in scalability and time consumption over the previous schemes.
KW - Cloud computing
KW - Internet of Things (IoT)
KW - modular exponentiation
KW - parallel algorithm
KW - secure outsourcing
UR - http://www.scopus.com/inward/record.url?scp=85112740387&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2020.3029030
DO - 10.1109/JIOT.2020.3029030
M3 - Journal article
AN - SCOPUS:85112740387
SN - 2327-4662
VL - 8
SP - 12782
EP - 12791
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 16
M1 - 9214962
ER -