Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

Céline Chevalier 1 Fabien Laguillaumie 2, 3 Damien Vergnaud 4, 5
3 ARIC - Arithmetic and Computing
Inria Grenoble - Rhône-Alpes, LIP - Laboratoire de l'Informatique du Parallélisme
4 CASCADE - Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities
DI-ENS - Département d'informatique de l'École normale supérieure, CNRS - Centre National de la Recherche Scientifique : UMR 8548, Inria de Paris
Abstract : We address the problem of speeding up group computations in cryptography using a single untrusted computational resource. We analyze the security of an efficient protocol for securely outsourcing multi-exponentiations proposed at ESORICS 2014. We show that this scheme does not achieve the claimed security guarantees and we present practical polynomial-time attacks on the delegation protocol which allow the untrusted helper to recover part (or the whole) of the device secret inputs. We then provide simple constructions for outsourcing group exponentiations in different settings (e.g. public/secret, fixed/variable bases and public/secret exponents). Finally, we prove that our attacks on the ESORICS 2014 protocol are unavoidable if one wants to use a single untrusted computational resource and to limit the computational cost of the limited device to a constant number of (generic) group operations. In particular, we show that our constructions are actually optimal in terms of operations in the underlying group.
Type de document :
Communication dans un congrès
Askoxylakis, Ioannis G. ; Ioannidis, Sotiris; Katsikas, Sokratis K.; Meadows, Catherine A. Computer Security - ESORICS 2016, Sep 2016, Heraklion, Greece. Springer, Lecture Notes in Computer Science 9878, pp.261-278, Computer Security – ESORICS 2016. 〈http://www.ics.forth.gr/esorics2016/index.html〉. 〈10.1007/978-3-319-45744-4_13〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01375817
Contributeur : Damien Vergnaud <>
Soumis le : lundi 3 octobre 2016 - 15:32:38
Dernière modification le : mercredi 16 mai 2018 - 22:46:02

Identifiants

Collections

Citation

Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions. Askoxylakis, Ioannis G. ; Ioannidis, Sotiris; Katsikas, Sokratis K.; Meadows, Catherine A. Computer Security - ESORICS 2016, Sep 2016, Heraklion, Greece. Springer, Lecture Notes in Computer Science 9878, pp.261-278, Computer Security – ESORICS 2016. 〈http://www.ics.forth.gr/esorics2016/index.html〉. 〈10.1007/978-3-319-45744-4_13〉. 〈hal-01375817〉

Partager

Métriques

Consultations de la notice

279