Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)

Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of perf...

Full description

Bibliographic Details
Main Authors: Crescenzo Giovanni Di, Khodjaeva Matluba, Kahrobaei Delaram, Shpilrain Vladimir
Format: Article
Language:English
Published: De Gruyter 2020-10-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2019-0036
id doaj-bb416b42ae9e449ba53121448fb7ea75
record_format Article
spelling doaj-bb416b42ae9e449ba53121448fb7ea752021-09-06T19:40:45ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842020-10-0114143845910.1515/jmc-2019-0036jmc-2019-0036Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)Crescenzo Giovanni Di0Khodjaeva Matluba1Kahrobaei Delaram2Shpilrain Vladimir3Perspecta Labs Inc. Basking Ridge, NJ, United States of AmericaCUNY John Jay College of Criminal Justice. New York, NY, United States of AmericaUniversity of York. Heslington, York, United KingdomCity University of New York. New, York, NY, United States of AmericaMany public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of performing a relatively small number of modular multiplications) delegates such primitive operations to a computationally stronger server. Important requirements for such delegation protocols include privacy of the client’s input exponent and security of the client’s output, in the sense of detecting, except for very small probability, any malicious server’s attempt to convince the client of an incorrect exponentiation result. Only recently, efficient protocols for the delegation of a fixed-based exponentiation, over cyclic and RSA-type groups with certain properties, have been presented and proved to satisfy both requirements.https://doi.org/10.1515/jmc-2019-0036secure delegationmodular exponentiationsdiscrete logarithmscryptographygroup theoryelliptic curves11t7194a60
collection DOAJ
language English
format Article
sources DOAJ
author Crescenzo Giovanni Di
Khodjaeva Matluba
Kahrobaei Delaram
Shpilrain Vladimir
spellingShingle Crescenzo Giovanni Di
Khodjaeva Matluba
Kahrobaei Delaram
Shpilrain Vladimir
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
Journal of Mathematical Cryptology
secure delegation
modular exponentiations
discrete logarithms
cryptography
group theory
elliptic curves
11t71
94a60
author_facet Crescenzo Giovanni Di
Khodjaeva Matluba
Kahrobaei Delaram
Shpilrain Vladimir
author_sort Crescenzo Giovanni Di
title Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
title_short Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
title_full Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
title_fullStr Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
title_full_unstemmed Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
title_sort delegating a product of group exponentiations with application to signature schemes (submission to special nutmic 2019 issue of jmc)
publisher De Gruyter
series Journal of Mathematical Cryptology
issn 1862-2976
1862-2984
publishDate 2020-10-01
description Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of performing a relatively small number of modular multiplications) delegates such primitive operations to a computationally stronger server. Important requirements for such delegation protocols include privacy of the client’s input exponent and security of the client’s output, in the sense of detecting, except for very small probability, any malicious server’s attempt to convince the client of an incorrect exponentiation result. Only recently, efficient protocols for the delegation of a fixed-based exponentiation, over cyclic and RSA-type groups with certain properties, have been presented and proved to satisfy both requirements.
topic secure delegation
modular exponentiations
discrete logarithms
cryptography
group theory
elliptic curves
11t71
94a60
url https://doi.org/10.1515/jmc-2019-0036
work_keys_str_mv AT crescenzogiovannidi delegatingaproductofgroupexponentiationswithapplicationtosignatureschemessubmissiontospecialnutmic2019issueofjmc
AT khodjaevamatluba delegatingaproductofgroupexponentiationswithapplicationtosignatureschemessubmissiontospecialnutmic2019issueofjmc
AT kahrobaeidelaram delegatingaproductofgroupexponentiationswithapplicationtosignatureschemessubmissiontospecialnutmic2019issueofjmc
AT shpilrainvladimir delegatingaproductofgroupexponentiationswithapplicationtosignatureschemessubmissiontospecialnutmic2019issueofjmc
_version_ 1717767941983830016