1. Introduction
In some real-time applications, handheld devices such as cell phone, Mp3, PDA need to do complex work (scientific computation, prime generation, etc.). For instance, a cell phone wants to generation a RSA modulus in public key cryptosystems. However, those handheld devices have very limited computing power and will cost much time to do such work [1]. It is desirable for us to improve the computation performance on the handheld devices. Taking account of the mobility and security, we will employ untrusted servers to offload heavy work. In those server-aided computations, security is important. This means that the auxiliary servers should not obtain any confidential information of the low-power devices.