ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing
暂无分享,去创建一个
[1] Mikhail J. Atallah,et al. Secure and Efficient Outsourcing of Sequence Comparisons , 2012, ESORICS.
[2] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Avishek Adhikari,et al. Introduction to Mathematical Cryptography , 2014 .
[4] Ximeng Liu,et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.
[5] Céline Chevalier,et al. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions , 2016, Algorithmica.
[6] Cong Wang,et al. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates , 2016, IEEE Transactions on Information Forensics and Security.
[7] G. Edward Suh,et al. Speeding up Exponentiation using an Untrusted Computational Resource , 2006, Des. Codes Cryptogr..
[8] William Stallings,et al. Cryptography and network security , 1998 .
[9] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[10] Zhen Liu,et al. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage , 2014, ESORICS.
[11] Kim-Kwang Raymond Choo,et al. Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases , 2016, IEEE Transactions on Information Forensics and Security.
[12] Mikhail J. Atallah,et al. Secure outsourcing of sequence comparisons , 2004, International Journal of Information Security.
[13] Marina Blanton,et al. Secure Outsourcing of DNA Searching via Finite Automata , 2010, DBSec.
[14] Hideki Imai,et al. Speeding Up Secret Computations with Insecure Auxiliary Devices , 1988, CRYPTO.
[15] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[16] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[17] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.
[18] Robert H. Deng,et al. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[19] Jian Ren,et al. Secure outsourcing of scalar multiplication on elliptic curves , 2016, 2016 IEEE International Conference on Communications (ICC).
[20] David J. Wu,et al. Function-Hiding Inner Product Encryption is Practical , 2018, IACR Cryptol. ePrint Arch..
[21] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[22] Robert H. Deng,et al. Privacy-Preserving Outsourced Calculation on Floating Point Numbers , 2016, IEEE Transactions on Information Forensics and Security.
[23] Osmanbey Uzunkol,et al. Efficient and verifiable algorithms for secure outsourcing of cryptographic computations , 2015, International Journal of Information Security.
[24] Jian Ren,et al. LinSOS: Secure outsourcing of linear computations based on affine mapping , 2016, 2016 IEEE International Conference on Communications (ICC).
[25] Phong Q. Nguyen,et al. Distribution of Modular Sums and the Security of the Server Aided Exponentiation , 2001 .
[26] Yan Huang,et al. Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance , 2015, CCS.
[27] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[28] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[29] Lakshmi Kuppusamy,et al. CRT-Based Outsourcing Algorithms for Modular Exponentiations , 2016, INDOCRYPT.
[30] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[31] Qian Wang,et al. Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.
[32] Ramarathnam Venkatesan,et al. Speeding up Discrete Log and Factoring Based Schemes via Precomputations , 1998, EUROCRYPT.
[33] Jianfeng Ma,et al. Efficient algorithms for secure outsourcing of bilinear pairings , 2015, Theor. Comput. Sci..
[34] Peter de Rooij,et al. On Schnorr’s preprocessing for digital signature schemes , 1997, Journal of Cryptology.