Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance

H Li, J Yu, H Zhang, M Yang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and 5G, edge computing, as a new
computing paradigm, has been widely popularized in academia and industry. Due to the …

EPPP4SMS: efficient privacy-preserving protocol for smart metering systems and its simulation using real-world data

F Borges, M Mühlhäuser - IEEE Transactions on Smart Grid, 2014 - ieeexplore.ieee.org
The main contribution of this paper is the construction of the efficient privacy-preserving
protocol for smart metering systems (EPPP4SMS), which brings together features of the best …

A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing

F Borges, D Demirel, L Böck… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
We present an innovative protocol combining innetwork data aggregation and smart meter
billing for a smart grid scenario. The former enables an energy supplier to allocate and …

Parallel algorithms for modular multi-exponentiation

F Borges, P Lara, R Portugal - Applied Mathematics and Computation, 2017 - Elsevier
Modular exponentiation is a time-consuming operation widely used in cryptography.
Modular multi-exponentiation, a generalization of modular exponentiation also used in …

[PDF][PDF] Parallelizing RSA algorithm on multicore CPU and GPU

HM Fadhil, MI Younis - International Journal of Computer Applications, 2014 - portal.arid.my
Public key algorithms are extensively known to be slower than symmetric key alternatives in
the area of cryptographic algorithms for the reason of their basis in modular arithmetic. The …

Efficient parallel secure outsourcing of modular exponentiation to cloud for IoT applications

Q Hu, M Duan, Z Yang, S Yu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Modular exponentiation, an operation widely utilized in cryptographic protocols to transfer
text and other forms of data, can also be applied to Internet-of-Things (IoT) devices with high …

A fast parallel modular exponentiation algorithm

KA Fathy, HM Bahig, AA Ragab - Arabian Journal for Science and …, 2018 - Springer
Modular exponentiation is a fundamental and most time-consuming operation in several
public-key cryptosystems such as the RSA cryptosystem. In this paper, we propose two new …

[图书][B] On Privacy-Preserving Protocols for Smart Metering Systems: Security and Privacy in Smart Grids

FB de Oliveira - 2016 - books.google.com
This book presents current research in privacy-preserving protocols for smart grids. It
contains several approaches and compares them analytically and by means of simulation. In …

Massively parallel modular exponentiation method and its implementation in software and hardware for high-performance cryptographic systems

N Nedjah, LM Mourelle, M Santana, S Raposo - IET computers & digital …, 2012 - IET
Most cryptographic systems are based on modular exponentiation (ME). It is performed
using successive modular multiplications (MMs). In this case, there are many ways to …

Efficient modular exponential algorithms compatible with hardware implementation of public‐key cryptography

S Vollala, K Geetha… - Security and …, 2016 - Wiley Online Library
It is widely recognized that the public‐key cryptosystem is playing a pivotal role to provide
the security services not only in electronic world but also for secured key exchanges in …