On secure outsourcing of cryptographic computations to cloud
Data(s) |
2014
|
---|---|
Resumo |
For the past few years, research works on the topic of secure outsourcing of cryptographic computations has drawn significant attention from academics in security and cryptology disciplines as well as information security practitioners. One main reason for this interest is their application for resource constrained devices such as RFID tags. While there has been significant progress in this domain since Hohenberger and Lysyanskaya have provided formal security notions for secure computation delegation, there are some interesting challenges that need to be solved that can be useful towards a wider deployment of cryptographic protocols that enable secure outsourcing of cryptographic computations. This position paper brings out these challenging problems with RFID technology as the use case together with our ideas, where applicable, that can provide a direction towards solving the problems. |
Identificador | |
Publicador |
ACM |
Relação |
http://dl.acm.org/citation.cfm?doid=2600075.2600085 DOI:10.1145/2600075.2600085 Kuppusamy, Lakshmi, Rangasamy, Jothi, & Gauravaram, Praveen (2014) On secure outsourcing of cryptographic computations to cloud. In Proceedings of the 2nd International Workshop on Security in Cloud Computing - SCC '14, ACM, pp. 63-68. |
Direitos |
Copyright 2014 ACM |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Tipo |
Conference Paper |