text and other forms of data, can also be applied to Internet-of-Things (IoT) devices with high
security requirements. However, due to the high resource consumption of modular
exponentiation, IoT devices can face the problem of resource insufficient. Fortunately, the
secure outsourcing scheme offers a new solution for resource-constrained devices. In this
article, we apply a parallel secure outsourcing scheme to provide the possibility for modular …
Modular exponentiation is crucial for secure data exchange in cryptography, especially for
resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party
servers to handle computationally intensive tasks like modular exponentiation. However,
existing outsourcing solutions for the RSA algorithm may have security vulnerabilities. This
work identifies a critical flaw in a recent outsourcing protocol for RSA proposed by Hu et al.
We demonstrate how this flaw compromises the security of the entire RSA system …