Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud

2020 ◽  
Vol 63 (8) ◽  
pp. 1271-1271
Author(s):  
Qianqian Su ◽  
Rui Zhang ◽  
Rui Xue

Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. $u^a$ mod $N$. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. $\prod ^{n}_{i=1}u^{a_i}_{i}$ mod $N$. Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we show that the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir’s identity-based signature and identity-based multi-signature.

Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.


2015 ◽  
Vol 2 (2) ◽  
pp. 86-96 ◽  
Author(s):  
M. Zomorrodi ◽  
N.C. Karmakar

The electromagnetic (EM) imaging technique at mm-band 60 GHz is proposed for data encoding purpose in the chipless Radio Frequency Identification (RFID) systems. The fully printable chipless RFID tag comprises tiny conductive EM polarizers to create high cross-polar radar cross-section. Synthetic aperture radar approach is applied for formation of the tag's EM-image and revealing the tag's content. The achieved high data encoding capacity of 2 bits/cm2in this technique based on a fully printable tag is very convincing for many applications. The system immunity to multipath interference, bending effect, and printing inaccuracy suggests huge potentials for low-cost item tagging. Tags are also readable through a tick paper envelop; hence secure identification is provided by the proposed technique.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3746 ◽  
Author(s):  
Antonio Lazaro ◽  
Ramon Villarino ◽  
David Girbau

In this article, an overview of recent advances in the field of battery-less near-field communication (NFC) sensors is provided, along with a brief comparison of other short-range radio-frequency identification (RFID) technologies. After reviewing power transfer using NFC, recommendations are made for the practical design of NFC-based tags and NFC readers. A list of commercial NFC integrated circuits with energy-harvesting capabilities is also provided. Finally, a survey of the state of the art in NFC-based sensors is presented, which demonstrates that a wide range of sensors (both chemical and physical) can be used with this technology. Particular interest arose in wearable sensors and cold-chain traceability applications. The availability of low-cost devices and the incorporation of NFC readers into most current mobile phones make NFC technology key to the development of green Internet of Things (IoT) applications.


2008 ◽  
pp. 1975-1993
Author(s):  
Katina Michael ◽  
Amelia Masters

Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into the spotlight. The challenge, at both national and global levels, of managing information in order to offensively resist attack or defensively keep citizens safe from further harm has never been greater. In meeting this challenge, the tools and strategies used by relevant defensive powers are a key factor in the success or failure of all activities, ranging from small-scale, homeland security administration through to large-scale, all-inclusive war. In all areas within this wide scope, the adoption of positioning technologies has played an important role. Of special significance are the global positioning system (GPS), second-generation (2G) and beyond mobile telephone networks (includingwireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). Since most positioning technology has been developed or released for use within the commercial sector, however, concerns beyond technological feasibility are raised when applications are harnessed solely for defense. The integration between commercial and military sectors and public and private needs must be considered and, primarily, this involves ensuring that the enforcement of homeland security does not compromise citizen rights.


Author(s):  
Emran Md Amin ◽  
Nemai Chandra Karmakar

A novel approach for non-invasive radiometric Partial Discharge (PD) detection and localization of faulty power apparatuses in switchyards using Chipless Radio Frequency Identification (RFID) based sensor is presented. The sensor integrates temperature sensing together with PD detection to assist on-line automated condition monitoring of high voltage equipment. The sensor is a multi-resonator based passive circuit with two antennas for reception of PD signal from the source and transmission of the captured PD to the base station. The sensor captures PD signal, processes it with designated spectral signatures as identification data bits, incorporates temperature information, and retransmits the data with PD signals to the base station. Analyzing the PD signal in the base station, both the PD levels and temperature of a particular faulty source can be retrieved. The prototype sensor was designed, fabricated, and tested for performance analysis. Results verify that the sensor is capable of identifying different sources at the events of PD. The proposed low cost passive RFID based PD sensor has a major advantage over existing condition monitoring techniques due to its scalability to large substations for mass deployment.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4740
Author(s):  
Sergio Terranova ◽  
Filippo Costa ◽  
Giuliano Manara ◽  
Simone Genovesi

A new class of Radio Frequency IDentification (RFID) tags, namely the three-dimensional (3D)-printed chipless RFID one, is proposed, and their performance is assessed. These tags can be realized by low-cost materials, inexpensive manufacturing processes and can be mounted on metallic surfaces. The tag consists of a solid dielectric cylinder, which externally appears as homogeneous. However, the information is hidden in the inner structure of the object, where voids are created to encrypt information in the object. The proposed chipless tag represents a promising solution for anti-counterfeiting or security applications, since it avoids an unwanted eavesdropping during the reading process or information retrieval from a visual inspection that may affect other chipless systems. The adopted data-encoding algorithm does not rely on On–Off or amplitude schemes that are commonly adopted in the chipless RFID implementations but it is based on the maximization of available states or the maximization of non-overlapping regions of uncertainty. The performance of such class of chipless RFID tags are finally assessed by measurements on real prototypes.


Sign in / Sign up

Export Citation Format

Share Document