On secure outsourcing of cryptographic computations to cloud


Autoria(s): Kuppusamy, Lakshmi; Rangasamy, Jothi; Gauravaram, Praveen
Data(s)

2014

Resumo

For the past few years, research works on the topic of secure outsourcing of cryptographic computations has drawn significant attention from academics in security and cryptology disciplines as well as information security practitioners. One main reason for this interest is their application for resource constrained devices such as RFID tags. While there has been significant progress in this domain since Hohenberger and Lysyanskaya have provided formal security notions for secure computation delegation, there are some interesting challenges that need to be solved that can be useful towards a wider deployment of cryptographic protocols that enable secure outsourcing of cryptographic computations. This position paper brings out these challenging problems with RFID technology as the use case together with our ideas, where applicable, that can provide a direction towards solving the problems.

Identificador

http://eprints.qut.edu.au/81416/

Publicador

ACM

Relação

http://dl.acm.org/citation.cfm?doid=2600075.2600085

DOI:10.1145/2600075.2600085

Kuppusamy, Lakshmi, Rangasamy, Jothi, & Gauravaram, Praveen (2014) On secure outsourcing of cryptographic computations to cloud. In Proceedings of the 2nd International Workshop on Security in Cloud Computing - SCC '14, ACM, pp. 63-68.

Direitos

Copyright 2014 ACM

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Tipo

Conference Paper