@inproceedings{8f9572280d9547f28d53c46087dd73d5,
title = "Securely outsourcing exponentiations with single untrusted program for cloud storage",
abstract = "Provable Data Possession (PDP) allows a file owner to outsource her files to a storage server such that a verifier can check the integrity of the outsourced file. Public verifiable PDP schemes allow any one other than the file owner to be a verifier. At the client side (file owner or verifier), a substantial number of modular exponentiations is often required. In this paper we make PDP more practical via proposing a protocol to securely outsource the (most generic) variable-exponent variable-base exponentiations in one untrusted program model. Our protocol demonstrates advantages in efficiency or privacy over existing protocols coping with only special cases in two or single untrusted program model. We then apply our generic protocol to Shacham-Waters PDP and a variant of Yuan-Yu PDP. The analyses show that our protocol makes PDP much more efficient at the client side.",
keywords = "cloud storage, modular exponentiation, offloading computation, provable Data Possession, verifiable computation",
author = "Yujue Wang and Qianhong Wu and Wong, \{Duncan S.\} and Bo Qin and Chow, \{Sherman S.M.\} and Zhen Liu and Xiao Tan",
year = "2014",
doi = "10.1007/978-3-319-11203-9\_19",
language = "英语",
isbn = "9783319112022",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
number = "PART 1",
pages = "326--343",
booktitle = "Computer Security, ESORICS 2014 - 19th European Symposium on Research in Compter Security, Proceedings",
address = "德国",
edition = "PART 1",
note = "19th European Symposium on Research in Computer Security, ESORICS 2014 ; Conference date: 07-09-2014 Through 11-09-2014",
}