Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
暂无分享,去创建一个
Wenjing Lou | Yuqing Zhang | Hui Li | Xuefeng Liu | Wenhai Sun | Hanyu Quan | Hui Li | W. Lou | Xuefeng Liu | Yuqing Zhang | Hanyu Quan | Wenhai Sun
[1] Feifei Li,et al. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams , 2007, VLDB.
[2] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[3] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[4] Yiwei Thomas Hou,et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[5] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[6] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[7] Yael Tauman Kalai,et al. Delegating computation: interactive proofs for muggles , 2008, STOC.
[8] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[9] Graham Cormode,et al. Practical verified computation with streaming interactive proofs , 2011, ITCS '12.
[10] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[11] Benjamin Braun,et al. Taking Proof-Based Verified Computation a Few Steps Closer to Practicality , 2012, USENIX Security Symposium.
[12] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[13] Suman Nath,et al. Publicly verifiable grouped aggregation queries on outsourced data streams , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[14] Rosario Gennaro,et al. Fully Homomorphic Message Authenticators , 2013, IACR Cryptol. ePrint Arch..
[15] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Yin Yang,et al. Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.
[18] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.
[19] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[20] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[21] Dan Boneh,et al. Homomorphic Signatures for Polynomial Functions , 2011, EUROCRYPT.
[22] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[23] Dr Tirumala Rao,et al. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2017 .
[24] Srinath T. V. Setty,et al. Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.
[25] Stavros Papadopoulos,et al. Lightweight authentication of linear algebraic queries on data streams , 2013, SIGMOD '13.
[26] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[27] T. Vijayalakshmi,et al. Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2015 .
[28] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[29] Dennis Shasha,et al. StatStream: Statistical Monitoring of Thousands of Data Streams in Real Time , 2002, VLDB.
[30] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[31] Elaine Shi,et al. Multi-Client Verifiable Computation with Stronger Security Guarantees , 2015, TCC.
[32] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[33] Yuqing Zhang,et al. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.
[34] Dario Fiore,et al. Practical Homomorphic MACs for Arithmetic Circuits , 2013, IACR Cryptol. ePrint Arch..
[35] Yael Tauman Kalai,et al. Memory Delegation , 2011, CRYPTO.
[36] Jonathan Katz,et al. Multi-Client Non-interactive Verifiable Computation , 2013, TCC.
[37] Srinath T. V. Setty,et al. A Hybrid Architecture for Interactive Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[38] Yin Yang,et al. CADS: Continuous Authentication on Data Streams , 2007, VLDB.