Secure outsource computing scheme of modular exponentiation based on single server

At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not...

Full description

Bibliographic Details
Main Author: Weijie DING
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2018-01-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018001/