Abstract
When carrying out outsourced cryptographic computations, it is possible not only to have errors in server computations but also to interact with a malicious computing server. In this paper, we propose an undeniable signature protocol adapted for a group of points of elliptic curve. We also present an outsourced algorithm for elliptic curve point multiplication.
Similar content being viewed by others
REFERENCES
Ch, R., Rao, K.V., and Vasumathi, D., Identity-based cryptosystem based on tate pairing, Global J. Comput. Sci. Technol., 2016, vol. 16, no. 5.
Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., and Tang, Q., Efficient algorithms for secure outsourcing of bilinear pairings, Theor. Comput. Sci., 2015, vol. 562, pp. 112–121.
Tian, H., Zhang, F., and Ren, K., Secure bilinear pairing outsourcing made more efficient and flexible, ASIA CCS’15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015, pp. 417–426.
Arabaci, O., Kiraz, M.S., Sertkaya, I., and Uzunkol, O., More efficient secure outsourcing methods for bilinear maps, Cryptol. ePrint Arch., 2016, no. 960.
Ren, Y., Dong, M., Niu, Z., and Du, X., Noninteractive verifiable outsourcing algorithm for bilinear pairing with improved checkability, Secur. Commun. Networks, 2017, vol. 2017.
Chaum, D. and Van Antwerpen, H., Undeniable signatures, Conference on the Theory and Application of Cryptology, New York, 1989, pp. 212–216.
Jao, D. and Soukharev, V., Isogeny-based quantum-resistant undeniable signatures, International Workshop on Post-Quantum Cryptography, Cham, 2014, pp. 160–179.
Lin, X.J., Sun, L., Qu, H., and Zhang, X., New approaches for secure outsourcing algorithm for modular exponentiations, Cryptol. ePrint Arch., 2016, no. 45.
Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Elliptic curves generation for isogeny-based cryptosystems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 928–935.
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated by Yu. Kornienko
About this article
Cite this article
Aleksandrova, E.B., Shkorkina, E.N. Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations. Aut. Control Comp. Sci. 52, 1160–1163 (2018). https://doi.org/10.3103/S0146411618080023
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411618080023