Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server
暂无分享,去创建一个
Yan Yu | Guomin Yang | Anmin Fu | Shui Yu | Yiming Zhu | Anmin Fu | Shui Yu | Yan Yu | Guomin Yang | Yiming Zhu
[1] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Abdullah Gani,et al. A survey on indexing techniques for big data: taxonomy and performance evaluation , 2016, Knowledge and Information Systems.
[3] Kim-Kwang Raymond Choo,et al. Secure outsourcing of modular exponentiations under single untrusted programme model , 2017, J. Comput. Syst. Sci..
[4] Ming Xu,et al. Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations , 2016, 2016 IEEE International Conference on Communications (ICC).
[5] Lu Zhou,et al. Efficiently and securely harnessing cloud to solve linear regression and other matrix operations , 2018, Future Gener. Comput. Syst..
[6] W. Ford,et al. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption , 2000 .
[7] Hui Li,et al. Verifiable algorithm for outsourced database with updating , 2017, Cluster Computing.
[8] Zheng Xu,et al. Secure outsourcing of modular exponentiations in cloud and cluster computing , 2016, Cluster Computing.
[9] Enzo Baccarelli,et al. Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications , 2018, The Journal of Supercomputing.
[10] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[11] Céline Chevalier,et al. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions , 2016, Algorithmica.
[12] Gang Xu,et al. Delegation of Computation with Verification Outsourcing: Curious Verifiers , 2017, IEEE Trans. Parallel Distributed Syst..
[13] Anmin Fu,et al. DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems , 2018, J. Netw. Comput. Appl..
[14] Xiaojiang Du,et al. An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing , 2017, 2017 IEEE International Conference on Communications (ICC).
[15] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[16] Shahaboddin Shamshirband,et al. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach , 2015, Journal of Grid Computing.
[17] Xinpeng Zhang,et al. Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability , 2016, AsiaCCS.
[18] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[19] Lakshmi Kuppusamy,et al. CRT-Based Outsourcing Algorithms for Modular Exponentiations , 2016, INDOCRYPT.
[20] Jin Li,et al. Outsourcing computation of modular exponentiations in cloud computing , 2013, Cluster Computing.
[21] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[22] Guo Xian-jiu. Cryptanalysis and improvement of several certificateless digital signature schemes , 2008 .
[23] Anmin Fu,et al. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users , 2017, IEEE Transactions on Big Data.
[24] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[25] Mauro Conti,et al. RARE: Defeating side channels based on data-deduplication in cloud storage , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[26] Anmin Fu,et al. Privacy-preserving public auditing for non-manager group , 2017, 2017 IEEE International Conference on Communications (ICC).
[27] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[28] Zhen Liu,et al. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage , 2014, ESORICS.
[29] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.
[30] Anthony T. Chronopoulos,et al. Introducing ToPe‐FFT: An OpenCL‐based FFT library targeting GPUs , 2017, Concurr. Comput. Pract. Exp..
[31] Ahmad Sharieh,et al. Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures , 2017, The Journal of Supercomputing.
[32] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[33] Osmanbey Uzunkol,et al. Efficient and verifiable algorithms for secure outsourcing of cryptographic computations , 2015, International Journal of Information Security.
[34] Xiaofeng Liao,et al. Securely and efficiently perform large matrix rank decomposition computation via cloud computing , 2015, Cluster Computing.
[35] Jianfeng Ma,et al. An Improved Algorithm for Secure Outsourcing of Modular Exponentiations , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[36] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[37] Jinguang Han,et al. VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud , 2020, IEEE Transactions on Services Computing.
[38] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[39] Mohammad Shojafar,et al. FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..
[40] Ximeng Liu,et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.
[41] Chunming Tang,et al. Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server , 2015, J. Ambient Intell. Humaniz. Comput..
[42] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[43] John Yearwood,et al. CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server , 2017, Digit. Commun. Networks.
[44] G. Edward Suh,et al. Speeding up Exponentiation using an Untrusted Computational Resource , 2006, Des. Codes Cryptogr..
[45] Yutao Ma,et al. Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey , 2017, IEEE Network.