ORGANIZE MODULAR EXPONENTIATION SECURE COMPYTATION BY USING ADDITIVE MASKING
Abstract
In this paper a method for the performing the calculations required for modular exponentiation using remote or distant computational resources. The proposed method operates by separating the procedure for modular exponentiation in two components. The first component which is computationally simple is performed on the user terminal and the second and computationally complex component, is executed on powerful cloud computational resources. The details of the proposed distributed calculation are presented. Hence, the methodology for the organization of the calculations is analyzed. The calculation is illustrated by means of a simple numerical example.
Key words: modular exponentiation, cloud computing, cryptography, secure computations.