Verifiable Delegation of Polynomials
暂无分享,去创建一个
Haiyan Zhang | Jun Ye | Changyou Fu | Jun Ye | Haiyan Zhang | Changyou Fu
[1] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[2] Elaine Shi,et al. Signatures of Correct Computation , 2013, TCC.
[3] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[4] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[5] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Jin Li,et al. Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing , 2015, Int. J. Netw. Secur..
[7] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[8] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[9] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[10] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[11] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[12] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[13] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[14] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[15] Qiang Tang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[16] Yael Tauman Kalai,et al. Memory Delegation , 2011, CRYPTO.
[17] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[18] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[19] Jonathan Katz,et al. Multi-Client Non-interactive Verifiable Computation , 2013, TCC.