Lattice-Based Cryptanalysis on Outsourcing Scheme of Modular Exponentiations ExpSOS

With the popularity of cloud computing, outsourcing computing, as an important form of cloud service, has attracted more and more attention from academia and industry. As a time-consuming basic cryptographic operation, modular exponential operation is widely used in RSA, digital signature algorithm...

Full description

Bibliographic Details
Main Author: ZHENG Yunhai, TIAN Chengliang
Format: Article
Language:zho
Published: Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press 2022-05-01
Series:Jisuanji kexue yu tansuo
Subjects:
Online Access:http://fcst.ceaj.org/fileup/1673-9418/PDF/1652926813552-1172593893.pdf