ORGANIZE MODULAR EXPONENTIATION SECURE COMPYTATION BY USING ADDITIVE MASKING

Authors

  • Markovskyi Oleksandr National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine

Abstract

In this paper a method for the performing the calculations required for modular exponentiation using remote or distant computational resources. The proposed method operates by separating the procedure for modular exponentiation in two components. The first component which is computationally simple is performed on the user terminal and the second and computationally complex component, is executed on powerful cloud computational resources. The details of the proposed distributed calculation are presented. Hence, the methodology for the organization of the calculations is analyzed. The calculation is illustrated by means of a simple numerical example.

Key words: modular exponentiation, cloud computing, cryptography, secure computations.

Published

2023-11-08

Issue

Section

IoT, Real Time Systems