{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:52:42Z","timestamp":1743033162235,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031326356"},{"type":"electronic","value":"9783031326363"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-32636-3_5","type":"book-chapter","created":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T14:02:40Z","timestamp":1683813760000},"page":"81-101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On Single-Server Delegation of\u00a0RSA"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[]},{"given":"Matluba","family":"Khodjaeva","sequence":"additional","affiliation":[]},{"given":"Ta","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Rajesh","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"David","family":"Shur","sequence":"additional","affiliation":[]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,12]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/0022-0000(89)90018-4","volume":"39","author":"M Abadi","year":"1989","unstructured":"Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. In J. Comput. Syst. Sci. 39(1), 21\u201350 (1989)","journal-title":"In J. Comput. Syst. Sci."},{"issue":"9","key":"5_CR2","doi-asserted-by":"publisher","first-page":"2299","DOI":"10.1093\/comjnl\/bxab066","volume":"65","author":"C Bouillaguet","year":"2022","unstructured":"Bouillaguet, C., Martinez, F., Vergnaud, D.: Cryptanalysis of modular exponentiation outsourcing protocols. Comput. J. 65(9), 2299\u20132314 (2022)","journal-title":"Comput. J."},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/978-3-319-07536-5_32","volume-title":"Applied Cryptography and Network Security","author":"S Canard","year":"2014","unstructured":"Canard, S., Devigne, J., Sanders, O.: Delegating a pairing can be both secure and efficient. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 549\u2013565. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07536-5_32"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-319-24837-0_10","volume-title":"Radio Frequency Identification","author":"B Cavallo","year":"2015","unstructured":"Cavallo, B., Di Crescenzo, G., Kahrobaei, D., Shpilrain, V.: Efficient and secure delegation of group exponentiation to a single server. In: Mangard, S., Schaumont, P. (eds.) RFIDSec 2015. LNCS, vol. 9440, pp. 156\u2013173. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24837-0_10"},{"key":"5_CR5","first-page":"541","volume":"2012","author":"X Chen","year":"2012","unstructured":"Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. Comput. Secur.-ESORICS 2012, 541\u2013556 (2012)","journal-title":"Comput. Secur.-ESORICS"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Chevallier-Mames, B., Coron, J.-S., McCullagh, N., Naccache, D., Scott, M.: Secure delegation of elliptic-curve pairing. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 24\u201335. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12510-2_3. eprint.iacr.org\/2005\/150","DOI":"10.1007\/978-3-642-12510-2_3"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. Algorithmica 83, 72\u2013115 (2021). also, Proc. ESORICS \u201916: 261\u2013278, Springer","DOI":"10.1007\/s00453-020-00750-2"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Practical and secure outsourcing of discrete log group exponentiation to a single malicious server. In: Proceedings of 9th ACM CCSW, pp. 17\u201328 (2017)","DOI":"10.1145\/3140649.3140657"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Efficient and secure delegation of exponentiation in general groups to a single malicious server. Math. Comput. Sci. 14(3), 641\u2013656 (2020). Also in IMCS 2018","DOI":"10.1007\/s11786-020-00462-4"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Secure delegation to a single malicious server: exponentiation in RSA-type Groups. In: Proceedings of 7th IEEE Conference on Communications and Network Security, CNS 2019, pp. 1\u20139 (2019)","DOI":"10.1109\/CNS.2019.8802691"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-57808-4_3","volume-title":"Applied Cryptography and Network Security","author":"G Di Crescenzo","year":"2020","unstructured":"Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Secure and efficient delegation of elliptic-curve pairing. In: Conti, M., Zhou, J., Casalicchio, E., Spognardi, A. (eds.) ACNS 2020. LNCS, vol. 12146, pp. 45\u201366. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57808-4_3"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-030-68487-7_6","volume-title":"Smart Card Research and Advanced Applications","author":"G Di Crescenzo","year":"2021","unstructured":"Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: Secure and efficient delegation of\u00a0pairings with online inputs. In: Liardet, P.-Y., Mentens, N. (eds.) CARDIS 2020. LNCS, vol. 12609, pp. 84\u201399. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68487-7_6"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Khodjaeva, M., Shpilrain, V., Kahrobaei, D., Krishnan, R.: Single-server delegation of ring multiplications from quasilinear-time clients. In: Proceedings of 14th International Conference on Security of Information and Networks (SIN), pp. 1\u20138 (2021)","DOI":"10.1109\/SIN54109.2021.9699330"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Di Crescenzo, G., Khodjaeva, M., Kahrobaei, D., Shpilrain, V.: A survey on delegated computation. In: Proceedings of DLT 2022. LNCS, vol. 13257, pp. 33\u201353. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-05578-2_3","DOI":"10.1007\/978-3-031-05578-2_3"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Khodjaeva, M., Krishnan, R., Shur, D.: Single-server delegation of small-exponent exponentiation from quasi-linear clients and applications. In: Proceedings of the ACM CCS 4th Workshop on CPS & IoT Security (CPSIoTSec 2022) (2022)","DOI":"10.1145\/3560826.3563385"},{"issue":"2","key":"5_CR16","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10623-005-3710-8","volume":"39","author":"M Dijk","year":"2006","unstructured":"Dijk, M., Clarke, D., Gassend, B., Suh, G., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Cryptogr. 39(2), 253\u2013273 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jcss.2016.11.005","volume":"90","author":"Y Ding","year":"2017","unstructured":"Ding, Y., Xu, Z., Ye, J., Choo, K.-K.R.: Secure outsourcing of modular exponentiations under single untrusted program model. Int. J. Comput. Syst. Sci. 90, 1\u201313 (2017)","journal-title":"Int. J. Comput. Syst. Sci."},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/3-540-39799-X_38","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"J Feigenbaum","year":"1986","unstructured":"Feigenbaum, J.: Encrypting problem instances: or ..., can you take advantage of someone without having to trust him? In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 477\u2013488. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/3-540-39799-X_38"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.jnca.2018.06.003","volume":"118","author":"A Fu","year":"2018","unstructured":"Fu, A., Li, S., Yu, S., Zhang, Y., Sun, Y.: Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server. J. Netw. Comp. App. 118, 102\u2013112 (2018)","journal-title":"J. Netw. Comp. App."},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1007\/s10586-018-2830-7","volume":"21","author":"A Fu","year":"2018","unstructured":"Fu, A., Zhu, Y., Yang, G., Yu, S., Yu, Y.: Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. Cluster Comput. 21, 1933\u20131947 (2018)","journal-title":"Cluster Comput."},{"key":"5_CR21","unstructured":"Galbraith, S.: Mathematics of Public-Key Cryptography. Cambridge Press, Cambridge (2018). version 2.0"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465\u2013482. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_25"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-540-30576-7_15","volume-title":"Theory of Cryptography","author":"S Hohenberger","year":"2005","unstructured":"Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264\u2013282. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30576-7_15"},{"key":"5_CR24","first-page":"847","volume":"16","author":"G Horng","year":"2000","unstructured":"Horng, G.: A secure server-aided RSA signature computation protocol for smart cards. J. Inf. Sci. Eng. 16, 847\u2013855 (2000)","journal-title":"J. Inf. Sci. Eng."},{"issue":"1","key":"5_CR25","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/58562.214082","volume":"36","author":"M Kaminski","year":"1989","unstructured":"Kaminski, M.: A note on probabilistically verifying integer and polynomial products. J. ACM 36(1), 142\u2013149 (1989)","journal-title":"J. ACM"},{"issue":"5","key":"5_CR26","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/49.223880","volume":"11","author":"S Kawamura","year":"1993","unstructured":"Kawamura, S., Shimbo, A.: Fast server-aided secret computation protocols for modular exponentiation. IEEE J. Sel. Areas Commun. 11(5), 778\u2013784 (1993)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"5_CR27","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/s10586-013-0252-0","volume":"16","author":"X Ma","year":"2013","unstructured":"Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Comput. 16(4), 787\u2013796 (2013)","journal-title":"Cluster Comput."},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/0-387-34799-2_35","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"T Matsumoto","year":"1990","unstructured":"Matsumoto, T., Kato, K., Imai, H.: Speeding up secret computations with insecure auxiliary devices. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 497\u2013506. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34799-2_35"},{"issue":"8","key":"5_CR29","first-page":"1194","volume":"62","author":"T Mefenza","year":"2019","unstructured":"Mefenza, T., Vergnaud, D.: Cryptanalysis of server-aided RSA protocols with private-key splitting. Comput. J. 62(8), 1194\u20131213 (2019)","journal-title":"Comput. J."},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Meulenaer, G., Gosset, F., Standaert, F.-X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless & Mobile Computing, Networking & Communication (2008)","DOI":"10.1109\/WiMob.2008.16"},{"key":"5_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-05378-9_1","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2018","author":"J Rangasamy","year":"2018","unstructured":"Rangasamy, J., Kuppusamy, L.: Revisiting single-server algorithms for outsourcing modular exponentiation. In: Chakraborty, D., Iwata, T. (eds.) INDOCRYPT 2018. LNCS, vol. 11356, pp. 3\u201320. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05378-9_1"},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TCC.2018.2851245","volume":"9","author":"Y Ren","year":"2021","unstructured":"Ren, Y., Dong, M., Qian, Z., Zhang, X., Feng, G.: Efficient algorithm for secure outsourcing of modular exponentiation with single server. IEEE Trans. Cloud Comput. 9, 145\u2013154 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5_CR33","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1093\/comjnl\/bxz165","volume":"63","author":"Q Su","year":"2020","unstructured":"Su, Q., Zhang, R., Xue, R.: Secure outsourcing algorithms for composite modular exponentiation based on single untrusted cloud. Comput. J. 63, 1271 (2020)","journal-title":"Comput. J."},{"key":"5_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-319-11203-9_19","volume-title":"Computer Security - ESORICS 2014","author":"Y Wang","year":"2014","unstructured":"Wang, Y., et al.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 326\u2013343. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11203-9_19"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Wasserman, H., Blum, M.: Software reliability via run-time result-checking. J. ACM 44(6), 826\u2013849 (2019). Proceedings of IEEE FOCS 94, 2019","DOI":"10.1145\/268999.269003"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Ye, J., Wang, J.: Secure outsourcing of modular exponentiation with single untrusted server. In: 18th International Conference on Network-Based Information Systems (2015)","DOI":"10.1109\/NBiS.2015.96"},{"key":"5_CR37","unstructured":"Yao, A.: A lower bound to palindrome recognition by probabilistic Turing Machines. Technical Report STAN-CS-77-647 (1977)"},{"key":"5_CR38","unstructured":"https:\/\/www.silabs.com\/mcu\/32-bit-microcontrollers\/efm32-giant-gecko"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-32636-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T14:03:20Z","timestamp":1683813800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-32636-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031326356","9783031326363"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-32636-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"12 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.secitc.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.68","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}