Safe outsourcing calculation method applied to RSA decryption

A computing method and security outsourcing technology, applied in the field of security outsourcing computing, can solve the problem of time-consuming RSA decryption process

Active Publication Date: 2018-06-12
QINGDAO UNIV
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to solve the time-consuming problem of the RSA decryption process in the prior art, the present invention provides a new secure outsourcing algorithm applied to RSA decryption, whic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe outsourcing calculation method applied to RSA decryption
  • Safe outsourcing calculation method applied to RSA decryption
  • Safe outsourcing calculation method applied to RSA decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The application subjects of the security outsourcing algorithm applied to RSA decryption provided by the present invention include users and cloud servers. What the user owns is a device with limited resources, so that the user cannot complete the calculation task with a large amount of calculation. The cloud has almost unlimited computing energy, which can provide users with on-demand resource usage rights. When users use outsourced computing, they hope that the outsourced computing task m=C d modn, but to protect the data from being acquired by entities other than the user, first preprocess the data and then transform the problem. Send the preprocessed and converted data and computing tasks to the cloud server. After receiving the computing tasks and data sent by the user, the cloud server performs calculations according to the requirements of the computing tasks. After the calculation is completed, the calculation result is sent to the user. Thereafter, the user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a novel safe outsourcing algorithm applied to RSA decryption. The algorithm satisfies an equation M=C<d>mod n, wherein input values are a ciphertext C, a private key d and a modulus n, the modulus n is a large composite number, factors p and q are provided, namely n=pq, and an output value is a plaintext m. Large module power multiplication is considered to be outsourced toa cloud server, so that a user only needs to execute a small amount of calculation to realize a decryption process of the RSA. Due to the fact that the scheme of the outsourcing calculation needs to meet the defined safety, in other words, the privacy, the correctness and the high-efficiency verification of input and output are achieved. According to the scheme, the indexes and the modulus in theRSA decryption process and the decrypted plaintext are protected, the calculation amount of a user side can be reduced after the outsourcing decryption calculation is carried out, and meanwhile, the safety requirement can be met.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a safe outsourcing computing method applied to an RSA decryption process. Background technique [0002] The RSA algorithm is one of the widely used public key encryption algorithms. The decryption stage needs to perform a power operation of a modulus large number, which is a very computationally consuming operation. For example, the 1024-bit long RSA decryption operation takes about 40 seconds on a small device. In order to solve this problem, many RSA deformations have been proposed. The running time of these algorithms is 2-3 times faster than that of the original RSA decryption algorithm. However, for devices with limited resources, such calculation consumption and calculation time are still very burdensome. To this end, we consider how to speed up the RSA decryption speed without changing the RSA decryption algorithm, so that RSA decryption can be run o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0861H04L9/302
Inventor 郝蓉于佳张翰林
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products