메뉴 건너뛰기




Volumn 39, Issue 2, 2006, Pages 253-273

Speeding up exponentiation using an untrusted computational resource

Author keywords

Exponentiation; Signature verification; Untrusted computation

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; CRYPTOGRAPHY; NETWORK PROTOCOLS;

EID: 33645066370     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-005-3710-8     Document Type: Article
Times cited : (60)

References (51)
  • 1
    • 84988764691 scopus 로고
    • A subexponential algorithm for discrete logarithms over all finite fields
    • Vol. 773 of LNCS, Springer-Verlag
    • L. M. Adleman and J. DeMarrais, A subexponential algorithm for discrete logarithms over all finite fields. In Advances in Cryptology - Crypto '93 Proceedings, Vol. 773 of LNCS, Springer-Verlag (1994) pp. 147-158.
    • (1994) Advances in Cryptology - Crypto '93 Proceedings , pp. 147-158
    • Adleman, L.M.1    DeMarrais, J.2
  • 2
    • 0026897713 scopus 로고
    • Attack on server assisted authentication protocols
    • R. J. Anderson, Attack on server assisted authentication protocols. Electronic Letters, Vol. 28, ISSUE 15, (1992), pp. 1473.
    • (1992) Electronic Letters , vol.28 , Issue.15 , pp. 1473
    • Anderson, R.J.1
  • 4
    • 84957639068 scopus 로고
    • Fast server-aided RSA signatures secure against active attacks
    • Vol. 963 of LNCS, Springer-Verlag
    • P. Béguin and J-J. Quisquater, Fast server-aided RSA signatures secure against active attacks. In Advances in Cryptology - Crypto '95 Proceedings, Vol. 963 of LNCS, (1995) Springer-Verlag, pp. 57-69.
    • (1995) Advances in Cryptology - Crypto '95 Proceedings , pp. 57-69
    • Béguin, P.1    Quisquater, J.-J.2
  • 5
    • 84958972496 scopus 로고    scopus 로고
    • High-bandwidth encryption with low-bandwidth smartcards
    • M. Blaze, High-bandwidth encryption with low-bandwidth smartcards. In Fast Software Encryption (FSE) '96, (1996) pp. 33-40.
    • (1996) Fast Software Encryption (FSE) '96 , pp. 33-40
    • Blaze, M.1
  • 6
    • 84957651500 scopus 로고    scopus 로고
    • A formal treatment of remotely keyed encryption
    • M. Blaze, J. Feigenbaum and M. Naor, A formal treatment of remotely keyed encryption. In Eurocrypt '98, (1998) pp. 251-265.
    • (1998) Eurocrypt '98 , pp. 251-265
    • Blaze, M.1    Feigenbaum, J.2    Naor, M.3
  • 10
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up discrete log and factoring based schemes via precomputations
    • Vol. 1403 of LNCS
    • V. Boyko, M. Peinado and R. Venkatesan, Speeding up discrete log and factoring based schemes via precomputations. In Proc. of Eurocrypt '98, Vol. 1403 of LNCS, (1998) pp. 221-232.
    • (1998) Proc. of Eurocrypt '98 , pp. 221-232
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 11
    • 33645093379 scopus 로고    scopus 로고
    • Stefan Brands, (2002). http://www.credentica.com/technology/overview.pdf.
    • (2002)
    • Brands, S.1
  • 13
    • 0028381806 scopus 로고
    • Parameter selection for server-aided RSA computation schemes
    • J. Burns and C. J. Mitchell, Parameter selection for server-aided RSA computation schemes. IEEE Transactions on Computers, Vol. 43, (1994).
    • (1994) IEEE Transactions on Computers , vol.43
    • Burns, J.1    Mitchell, C.J.2
  • 15
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two
    • D. Coppersmith, Fast evaluation of logarithms in fields of characteristic two. In IEEE Transactions Information Theory 30, (1984) pp. 587-594.
    • (1984) IEEE Transactions Information Theory , vol.30 , pp. 587-594
    • Coppersmith, D.1
  • 16
    • 33645094601 scopus 로고    scopus 로고
    • Concealment and its applications to authenticated encryption
    • Y. Dodis and J. An, Concealment and its applications to authenticated encryption. In Eurocrypt '03, (2003) pp. 306-323.
    • (2003) Eurocrypt '03 , pp. 306-323
    • Dodis, Y.1    An, J.2
  • 17
    • 84937417845 scopus 로고    scopus 로고
    • Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99
    • Vol. 1976 of LNCS, Springer-Verlag
    • G. Durfee and P. Nguyen, Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. In Advances in Cryptology - Asiacrypt 2000 Proceedings, Vol. 1976 of LNCS, (2000) Springer-Verlag, pp. 14-29.
    • (2000) Advances in Cryptology - Asiacrypt 2000 Proceedings , pp. 14-29
    • Durfee, G.1    Nguyen, P.2
  • 18
    • 85032883059 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • LNCS, Springer-Verlag
    • T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology - Crypto '84 Proceedings, LNCS, (1985) Springer-Verlag, pp. 10-18.
    • (1985) Advances in Cryptology - Crypto '84 Proceedings , pp. 10-18
    • ElGamal, T.1
  • 19
    • 0000303380 scopus 로고
    • Discrete logarithms in GF(p) using the number field sieve
    • D. Gordon, Discrete logarithms in GF(p) using the number field sieve. In SIAM J. Discrete Math. 6, (1993) pp. 312-323.
    • (1993) SIAM J. Discrete Math. , vol.6 , pp. 312-323
    • Gordon, D.1
  • 20
    • 33645072162 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • S. Hohenberger and A. Lysyanskaya, How to securely outsource cryptographic computations. In TOC 2005, (2005).
    • (2005) TOC 2005
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 23
    • 84955368946 scopus 로고
    • More flexible exponentiation with precomputation
    • Vol. 839 of LNCS, Springer-Verlag
    • C. H. Lim and P. J. Lee, More flexible exponentiation with precomputation. In Advances in Cryptology - Crypto '94 Proceedings, Vol. 839 of LNCS, (1994) Springer-Verlag, pp. 95-107.
    • (1994) Advances in Cryptology - Crypto '94 Proceedings , pp. 95-107
    • Lim, C.H.1    Lee, P.J.2
  • 24
    • 84957641879 scopus 로고
    • Server(prover/signer)-aided verification of identify proofs and signatures
    • Vol. 921 of LNCS, Springer-Verlag
    • C. H. Lim and P. J. Lee, Server(prover/signer)-aided verification of identify proofs and signatures. In Advances in Cryptology - EuroCrypt '95 Proceedings, Vol. 921 of LNCS, (1995) Springer-Verlag, pp. 64-78.
    • (1995) Advances in Cryptology - EuroCrypt '95 Proceedings , pp. 64-78
    • Lim, C.H.1    Lee, P.J.2
  • 25
    • 84957648348 scopus 로고
    • Security and performance of server-aided RSA computation protocols
    • Vol. 963 of LNCS, Springer-Verlag
    • C. H. Lim and P. J. Lee, Security and performance of server-aided RSA computation protocols. In Advances in Cryptology - Crypto '95 Proceedings, Vol. 963 of LNCS, (1995) Springer-Verlag, pp. 70-83.
    • (1995) Advances in Cryptology - Crypto '95 Proceedings , pp. 70-83
    • Lim, C.H.1    Lee, P.J.2
  • 26
    • 84947939989 scopus 로고    scopus 로고
    • On the security of remotely keyed encryption
    • S. Lucks, On the Security of remotely Keyed Encryption. In Fast Software Encryption (FSE) '97, (1997) pp. 219-229.
    • (1997) Fast Software Encryption (FSE) '97 , pp. 219-229
    • Lucks, S.1
  • 27
    • 33645075965 scopus 로고    scopus 로고
    • Accelerated remotely keyed encryption
    • S. Lucks, Accelerated Remotely Keyed Encryption. In Fast Software Encryption (FSE) '99, (1999) pp. 112-123.
    • (1999) Fast Software Encryption (FSE) '99 , pp. 112-123
    • Lucks, S.1
  • 28
    • 21344491195 scopus 로고
    • On verifiable implicit asking protocols for RSA computation
    • T. Matsumoto, H. Imai, C. S. Laih and S. M. Yen, On verifiable implicit asking protocols for RSA computation. In Proc. of Auscrypt '92, (1993) pp. 296-307.
    • (1993) Proc. of Auscrypt '92 , pp. 296-307
    • Matsumoto, T.1    Imai, H.2    Laih, C.S.3    Yen, S.M.4
  • 29
    • 85031767993 scopus 로고
    • Speeding up secret computation with insecure auxiliary devices
    • Vol. 403 of LNCS, Springer-Verlag
    • T. Matsumoto, K. Kato and H. Imai, Speeding up secret computation with insecure auxiliary devices. In Advances in Cryptology - Crypto '88 Proceedings, Vol. 403 of LNCS, (1989) Springer-Verlag, pp. 497-506.
    • (1989) Advances in Cryptology - Crypto '88 Proceedings , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 32
    • 84946830399 scopus 로고    scopus 로고
    • On the insecurity of a server-aided RSA protocol
    • Vol. 2248 of LNCS
    • P. Q. Nguyen and I. E. Shparlinski, On the insecurity of a server-aided RSA protocol. In Proc. of Asiacrypt 2001, Vol. 2248 of LNCS, (2001) pp. 21-35.
    • (2001) Proc. of Asiacrypt 2001 , pp. 21-35
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 34
    • 84947806031 scopus 로고    scopus 로고
    • The béguin-quisquater server-aided RSA protocol from Crypto '95 is not secure
    • Vol. 1514 of LNCS
    • P. Q. Nguyen and J. Stern, The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. In Proc. of Asiacrypt '98, Vol. 1514 of LNCS, (1998) pp. 372-379.
    • (1998) Proc. of Asiacrypt '98 , pp. 372-379
    • Nguyen, P.Q.1    Stern, J.2
  • 36
    • 0001534053 scopus 로고    scopus 로고
    • Discrete logarithms: The past and the future
    • A. Odlyzko, Discrete logarithms: The past and the future. In Designs, Codes and Cryptography, 19, (2000) pp. 129-145.
    • (2000) Designs, Codes and Cryptography , vol.19 , pp. 129-145
    • Odlyzko, A.1
  • 37
    • 84955578798 scopus 로고
    • Attacks on protocols for server-aided RSA computation
    • Vol. 658 of LNCS
    • B. Pfitzmann and M. Waidner, Attacks on protocols for server-aided RSA computation. In Proc. of Eurocrypt '92, Vol. 658 of LNCS, (1993) pp. 153-162.
    • (1993) Proc. of Eurocrypt '92 , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 38
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation (mod p)
    • J. M. Pollard, Monte Carlo methods for index computation (mod p). In Mathematics of Computation. 32, (1978) pp. 918-924.
    • (1978) Mathematics of Computation , vol.32 , pp. 918-924
    • Pollard, J.M.1
  • 39
    • 0005063381 scopus 로고
    • Speeding up smart card RSA computation with insecure coprocessors
    • J-J. Quisquater and M. De Soete, Speeding up smart card RSA computation with insecure coprocessors. In Proc. Smart Card 2000, (1991) pp. 191-197.
    • (1991) Proc. Smart Card 2000 , pp. 191-197
    • Quisquater, J.-J.1    De Soete, M.2
  • 40
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21 1978 pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 41
    • 35048859177 scopus 로고
    • On the security of the Schnorr scheme using preprocessing
    • Vol. 547 of LNCS, Springer-Verlag
    • P. de Rooij, On the security of the Schnorr scheme using preprocessing. In Advances in Cryptology - Eurocrypt '91 Proceedings, Vol. 547 of LNCS, (1991) Springer-Verlag, pp. 71-80.
    • (1991) Advances in Cryptology - Eurocrypt '91 Proceedings , pp. 71-80
    • De Rooij, P.1
  • 42
    • 84948971456 scopus 로고
    • Efficient exponentiation using precomputation and vector addition chains
    • Vol. 950 of LNCS, Springer-Verlag
    • P. de Rooij, Efficient exponentiation using precomputation and vector addition chains. In Advances in Cryptology - Eurocrypt '94 Proceedings, Vol. 950 of LNCS, (1995) Springer-Verlag, pp. 389-399.
    • (1995) Advances in Cryptology - Eurocrypt '94 Proceedings , pp. 389-399
    • De Rooij, P.1
  • 43
    • 24144497588 scopus 로고    scopus 로고
    • On Schnorr's preprocessing for digital signature schemes
    • P. de Rooij, On Schnorr's preprocessing for digital signature schemes. Journal of Cryptology, Vol. 10, ISSUE 1, (1997) pp. 1-16.
    • (1997) Journal of Cryptology , vol.10 , Issue.1 , pp. 1-16
    • De Rooij, P.1
  • 46
    • 84958036387 scopus 로고    scopus 로고
    • Discrete logarithms: The effectiveness of the index calculus method
    • Vol. 1122 of LNCS Springer-Verlag
    • O. Schirokauer, D. Weber and Th. F. Denny. Discrete logarithms: the effectiveness of the index calculus method. In Proceedings ANTS II, Vol. 1122 of LNCS. (1996) Springer-Verlag.
    • (1996) Proceedings ANTS II
    • Schirokauer, O.1    Weber, D.2    Denny, T.F.3
  • 47
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Vol. 435 of LNCS, Springer-Verlag
    • C. P. Schnorr, Efficient identification and signatures for smart cards. In Advances in Cryptology - Crypto '89 Proceedings, Vol. 435 of LNCS, (1990) Springer-Verlag, pp. 239-252.
    • (1990) Advances in Cryptology - Crypto '89 Proceedings , pp. 239-252
    • Schnorr, C.P.1
  • 48
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. P. Schnorr, Efficient signature generation by smart cards. Journal of Cryptology, Vol. 4, ISSUE 3, (1991) pp. 161-174.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 51
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents (abstract)
    • Michael J. Wiener, Cryptanalysis of short RSA secret exponents (abstract). In IEEE Transactions on Information Theory, Vol. 36, ISSUE 3 (1990) pp. 553-558.
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.3 , pp. 553-558
    • Wiener, M.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.