Skip to main navigation Skip to search Skip to main content

Securely outsourcing exponentiations with single untrusted program for cloud storage

  • Yujue Wang
  • , Qianhong Wu*
  • , Duncan S. Wong
  • , Bo Qin
  • , Sherman S.M. Chow
  • , Zhen Liu
  • , Xiao Tan
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Provable Data Possession (PDP) allows a file owner to outsource her files to a storage server such that a verifier can check the integrity of the outsourced file. Public verifiable PDP schemes allow any one other than the file owner to be a verifier. At the client side (file owner or verifier), a substantial number of modular exponentiations is often required. In this paper we make PDP more practical via proposing a protocol to securely outsource the (most generic) variable-exponent variable-base exponentiations in one untrusted program model. Our protocol demonstrates advantages in efficiency or privacy over existing protocols coping with only special cases in two or single untrusted program model. We then apply our generic protocol to Shacham-Waters PDP and a variant of Yuan-Yu PDP. The analyses show that our protocol makes PDP much more efficient at the client side.

Original languageEnglish
Title of host publicationComputer Security, ESORICS 2014 - 19th European Symposium on Research in Compter Security, Proceedings
PublisherSpringer Verlag
Pages326-343
Number of pages18
EditionPART 1
ISBN (Print)9783319112022
DOIs
StatePublished - 2014
Event19th European Symposium on Research in Computer Security, ESORICS 2014 - Wroclaw, Poland
Duration: 7 Sep 201411 Sep 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume8712 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th European Symposium on Research in Computer Security, ESORICS 2014
Country/TerritoryPoland
CityWroclaw
Period7/09/1411/09/14

Keywords

  • cloud storage
  • modular exponentiation
  • offloading computation
  • provable Data Possession
  • verifiable computation

Fingerprint

Dive into the research topics of 'Securely outsourcing exponentiations with single untrusted program for cloud storage'. Together they form a unique fingerprint.

Cite this