Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting
暂无分享,去创建一个
[1] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[2] Yiwei Thomas Hou,et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[3] Stavros Papadopoulos,et al. Lightweight authentication of linear algebraic queries on data streams , 2013, SIGMOD '13.
[4] Graham Cormode,et al. Practical verified computation with streaming interactive proofs , 2011, ITCS '12.
[5] Srinath T. V. Setty,et al. A Hybrid Architecture for Interactive Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Yuqing Zhang,et al. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.
[7] Wenjing Lou,et al. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys , 2017, IEEE Transactions on Services Computing.
[8] Elaine Shi,et al. Multi-Client Verifiable Computation with Stronger Security Guarantees , 2015, TCC.
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Suman Nath,et al. Publicly verifiable grouped aggregation queries on outsourced data streams , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[12] Rosario Gennaro,et al. Fully Homomorphic Message Authenticators , 2013, IACR Cryptol. ePrint Arch..