Title
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures
Abstract
We investigate the problem of securely outsourcing the modular exponentiations in cryptography to an untrusted server, and analyze the security and the efficiency of three privacy-preserving outsourcing protocols for exponentiations proposed in Ding et al. (2017) [18]. Based on Coppersmith's lattice-based method, we present heuristic polynomial-time and ciphertext-only weak-key attacks on these protocols, which shows that the recommended size of the secret keys in their protocols can not assure the input privacy of the exponents. Correspondingly, we explicitly estimate the size of the secure secret keys to circumvent our attacks, and analyze the efficiency of the revised protocols with security settings. Our theoretical analysis and experimental results demonstrate that the protocol of single modular exponentiation is unavailable, the protocol of simultaneous modular exponentiations is not so efficient as claimed but still available, and the protocol of multiple modular exponentiations becomes more efficient as the number of exponentiations increases.
Year
DOI
Venue
2021
10.1016/j.jcss.2021.04.006
Journal of Computer and System Sciences
Keywords
DocType
Volume
Computation outsourcing,Modular exponentiations,Weak-key attack,Coppersmith's method,Privacy-preserving
Journal
121
ISSN
Citations 
PageRank 
0022-0000
1
0.35
References 
Authors
33
5
Name
Order
Citations
PageRank
Yunhai Zheng110.35
Chengliang Tian2677.21
Hanlin Zhang332820.20
Jia Yu447557.62
Fengjun Li523323.55