Speeding up Exponentiation using an Untrusted Computational Resource (Part 1) Author: M. Van Dijk, D. Clarke, B. Gassend, G.E. Suh and S. Devadas Source: Designs, Codes and Cryptography (IF:0.825), 39, 253- 273,2006. (7 citations) Presenter: Yu-Chi Chen
15
Embed
Speeding up Exponentiation using an Untrusted Computational Resource (Part 1) Author: M. Van Dijk, D. Clarke, B. Gassend, G.E. Suh and S. Devadas Source:
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Speeding up Exponentiation using an Untrusted Computational Resource
(Part 1)Author: M. Van Dijk, D. Clarke, B. Gassend, G.E. Suh and S. Devadas
Source: Designs, Codes and Cryptography (IF:0.825), 39, 253-273,2006. (7 citations)
Presenter: Yu-Chi Chen
Outline
• Introduction and model
• The protocols
• Conclusions
2
Introduction
spiderman
Compute gx
rely
HTC Desire HD
rely
Server
Untrusted Computational Resource
3
Introduction
Compute gx
HTC Desire HD rely
Server
Untrusted Computational Resource
Correctness-checkingand get gx
4
Model
• Tim: – a trusted device
– wants to solve a problem P.
– relies on a more powerful device to solve.
• Ursula:– a powerful device
– possibly untrusted.
5
Model
• Requirements and properties:– Efficiency: Relying on Ursula is better than Tim’s
computing directly.
– Completeness: Tim can obtain the correct solution from Ursula’s help.
– Soundness: Tim must be with sufficiently high probability to get the correct solution and detect that Ursula is being dishonest.
6
Model
• A method is desirable to hide problem P or parts of P for Ursula.
• Assumption:– Tim can perform Off-line tasks, when Ursula is
doing something.
– The off-line tasks only perform less or simple computations.
– Communication bandwidth is good.
7
Model
• We only consider the computation cost (not the communication cost).
• This kind of methods is not applied in smartcards, because of no off-line task.