Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of perf...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2020-10-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2019-0036 |
id |
doaj-bb416b42ae9e449ba53121448fb7ea75 |
---|---|
record_format |
Article |
spelling |
doaj-bb416b42ae9e449ba53121448fb7ea752021-09-06T19:40:45ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842020-10-0114143845910.1515/jmc-2019-0036jmc-2019-0036Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)Crescenzo Giovanni Di0Khodjaeva Matluba1Kahrobaei Delaram2Shpilrain Vladimir3Perspecta Labs Inc. Basking Ridge, NJ, United States of AmericaCUNY John Jay College of Criminal Justice. New York, NY, United States of AmericaUniversity of York. Heslington, York, United KingdomCity University of New York. New, York, NY, United States of AmericaMany public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of performing a relatively small number of modular multiplications) delegates such primitive operations to a computationally stronger server. Important requirements for such delegation protocols include privacy of the client’s input exponent and security of the client’s output, in the sense of detecting, except for very small probability, any malicious server’s attempt to convince the client of an incorrect exponentiation result. Only recently, efficient protocols for the delegation of a fixed-based exponentiation, over cyclic and RSA-type groups with certain properties, have been presented and proved to satisfy both requirements.https://doi.org/10.1515/jmc-2019-0036secure delegationmodular exponentiationsdiscrete logarithmscryptographygroup theoryelliptic curves11t7194a60 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Crescenzo Giovanni Di Khodjaeva Matluba Kahrobaei Delaram Shpilrain Vladimir |
spellingShingle |
Crescenzo Giovanni Di Khodjaeva Matluba Kahrobaei Delaram Shpilrain Vladimir Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC) Journal of Mathematical Cryptology secure delegation modular exponentiations discrete logarithms cryptography group theory elliptic curves 11t71 94a60 |
author_facet |
Crescenzo Giovanni Di Khodjaeva Matluba Kahrobaei Delaram Shpilrain Vladimir |
author_sort |
Crescenzo Giovanni Di |
title |
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC) |
title_short |
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC) |
title_full |
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC) |
title_fullStr |
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC) |
title_full_unstemmed |
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC) |
title_sort |
delegating a product of group exponentiations with application to signature schemes (submission to special nutmic 2019 issue of jmc) |
publisher |
De Gruyter |
series |
Journal of Mathematical Cryptology |
issn |
1862-2976 1862-2984 |
publishDate |
2020-10-01 |
description |
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of performing a relatively small number of modular multiplications) delegates such primitive operations to a computationally stronger server. Important requirements for such delegation protocols include privacy of the client’s input exponent and security of the client’s output, in the sense of detecting, except for very small probability, any malicious server’s attempt to convince the client of an incorrect exponentiation result. Only recently, efficient protocols for the delegation of a fixed-based exponentiation, over cyclic and RSA-type groups with certain properties, have been presented and proved to satisfy both requirements. |
topic |
secure delegation modular exponentiations discrete logarithms cryptography group theory elliptic curves 11t71 94a60 |
url |
https://doi.org/10.1515/jmc-2019-0036 |
work_keys_str_mv |
AT crescenzogiovannidi delegatingaproductofgroupexponentiationswithapplicationtosignatureschemessubmissiontospecialnutmic2019issueofjmc AT khodjaevamatluba delegatingaproductofgroupexponentiationswithapplicationtosignatureschemessubmissiontospecialnutmic2019issueofjmc AT kahrobaeidelaram delegatingaproductofgroupexponentiationswithapplicationtosignatureschemessubmissiontospecialnutmic2019issueofjmc AT shpilrainvladimir delegatingaproductofgroupexponentiationswithapplicationtosignatureschemessubmissiontospecialnutmic2019issueofjmc |
_version_ |
1717767941983830016 |