Netinfo Security ›› 2019, Vol. 19 ›› Issue (3): 81-86.doi: 10.3969/j.issn.1671-1122.2019.03.010

• Orginal Article • Previous Articles     Next Articles

A Secure Outsourcing Computation Scheme for El-Gamal Signature Generation

Pu ZHAO1, Wei CUI2, Rong HAO1(), Jia YU1,3   

  1. 1. College of Computer Science and Technology, Qingdao University, Qingdao Shandong 266071, China
    2. Information Center of the Ministry of Science and Technology, Beijing 100862, China
    3. State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2018-07-10 Online:2019-03-19 Published:2020-05-11

Abstract:

As a new computing mode, cloud computing has realized people’s requirement of computing power as a resource. Cloud servers can provide resource-constrained clients with much support, including computing power and storage space. But fully trusted servers are rare in practice. Untrusted servers may steal the privacy of the clients. This paper presents a secure outsourcing scheme for El-Gamal signature generation, which makes resource-constrained signers could efficiently generate El-Gamal signature with the help of cloud servers. Meanwhile, our scheme also provides privacy protection of signers. Our scheme also includes verification mechanism, which allows signer to check the correctness of result returned by the cloud server. The security analysis proves that our proposed scheme can help signers to improve signature generation efficiency under the premise of protecting signers’ privacy.

Key words: secure outsourcing computation, El-Gamal signature, cloud computing security

CLC Number: