Skip to main content
placeholder image

Efficient algorithms for secure outsourcing of bilinear pairings

Journal Article


Download full-text (Open Access)

Abstract


  • The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure outsourcing algorithm for bilinear pairings in the two untrusted program model. Compared with the state-of-the-art algorithm, a distinguishing property of our proposed algorithm is that the (resource-constrained) outsourcer is not required to perform any expensive operations, such as point multiplications or exponentiations. Furthermore, we utilize this algorithm as a subroutine to achieve outsource-secure identity-based encryptions and signatures.

UOW Authors


  •   Chen, Xiaofeng (external author)
  •   Susilo, Willy
  •   Li, Jin (external author)
  •   Wong, Duncan S. (external author)
  •   Ma, Jianfeng (external author)
  •   Tang, Shaohua (external author)
  •   Tang, Qiang (external author)

Publication Date


  • 2015

Citation


  • Chen, X., Susilo, W., Li, J., Wong, D., Ma, J., Tang, S. & Tang, Q. (2015). Efficient algorithms for secure outsourcing of bilinear pairings. Theoretical Computer Science, 562 112-121.

Scopus Eid


  • 2-s2.0-84926306709

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=4278&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3262

Has Global Citation Frequency


Number Of Pages


  • 9

Start Page


  • 112

End Page


  • 121

Volume


  • 562

Place Of Publication


  • Netherlands

Abstract


  • The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure outsourcing algorithm for bilinear pairings in the two untrusted program model. Compared with the state-of-the-art algorithm, a distinguishing property of our proposed algorithm is that the (resource-constrained) outsourcer is not required to perform any expensive operations, such as point multiplications or exponentiations. Furthermore, we utilize this algorithm as a subroutine to achieve outsource-secure identity-based encryptions and signatures.

UOW Authors


  •   Chen, Xiaofeng (external author)
  •   Susilo, Willy
  •   Li, Jin (external author)
  •   Wong, Duncan S. (external author)
  •   Ma, Jianfeng (external author)
  •   Tang, Shaohua (external author)
  •   Tang, Qiang (external author)

Publication Date


  • 2015

Citation


  • Chen, X., Susilo, W., Li, J., Wong, D., Ma, J., Tang, S. & Tang, Q. (2015). Efficient algorithms for secure outsourcing of bilinear pairings. Theoretical Computer Science, 562 112-121.

Scopus Eid


  • 2-s2.0-84926306709

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=4278&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3262

Has Global Citation Frequency


Number Of Pages


  • 9

Start Page


  • 112

End Page


  • 121

Volume


  • 562

Place Of Publication


  • Netherlands