Secure outsourcing of scalar multiplication on elliptic curves

Kai Zhou, Jian Ren

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

8 Citations (Scopus)

Abstract

Cloud computing enables resource-constrained endusers to outsource their computational tasks to the cloud in a flexible manner. One major concern of computation outsourcing is the security of the outsourced data as well as the results. In this paper, we propose a secure outsourcing scheme (SecMul) for one basic and expensive computation in cryptography, that is scalar multiplication of points on elliptic curves. The basic idea of the proposed SecMul is to transfer computations in a finite field to computations in a ring. The scheme is designed in such a way that without the secret key, it is computationally infeasible for the cloud to recover the input and the output. The proposed SecMul is highly efficient in that it enables the endusers to outsource a scalar multiplication at the cost of only a few multiplications. Especially, the performance gain of outsourcing is O(log(s)), where s is the multiplier. Our comprehensive security and complexity analysis demonstrate that the proposed SecMul scheme is both secure and efficient.

Original languageEnglish
Title of host publication2016 IEEE International Conference on Communications, ICC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479966646
DOIs
Publication statusPublished - 12 Jul 2016
Externally publishedYes
Event2016 IEEE International Conference on Communications, ICC 2016 - Kuala Lumpur, Malaysia
Duration: 22 May 201627 May 2016

Publication series

Name2016 IEEE International Conference on Communications, ICC 2016

Conference

Conference2016 IEEE International Conference on Communications, ICC 2016
Country/TerritoryMalaysia
CityKuala Lumpur
Period22/05/1627/05/16

Keywords

  • Cloud computing
  • elliptic curve
  • scalar multiplication
  • secure outsourcing

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Secure outsourcing of scalar multiplication on elliptic curves'. Together they form a unique fingerprint.

Cite this