Secure outsourcing of modular exponentiations under single untrusted programme model
暂无分享,去创建一个
[1] Jinjun Chen,et al. HKE‐BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing , 2016, Concurr. Comput. Pract. Exp..
[2] Lan Chen,et al. Semantic Link Network-Based Model for Organizing Multimedia Big Data , 2014, IEEE Transactions on Emerging Topics in Computing.
[3] Jianfeng Ma,et al. An Improved Algorithm for Secure Outsourcing of Modular Exponentiations , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[4] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[5] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[6] Jin Li,et al. Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.
[7] G. Edward Suh,et al. Speeding up Exponentiation using an Untrusted Computational Resource , 2006, Des. Codes Cryptogr..
[8] Haiyan Zhang,et al. Verifiable Delegation of Polynomials , 2016, Int. J. Netw. Secur..
[9] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[10] Zhen Liu,et al. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage , 2014, ESORICS.
[11] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[12] Joan Feigenbaum,et al. Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.
[13] Jianfeng Wang,et al. Secure Outsourcing of Modular Exponentiation with Single Untrusted Server , 2015, 2015 18th International Conference on Network-Based Information Systems.
[14] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[15] Yael Tauman Kalai,et al. Memory Delegation , 2011, CRYPTO.
[16] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[17] Yi Mu,et al. Server-Aided Verification Signatures: Definitions and New Constructions , 2008, ProvSec.
[18] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[19] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[20] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[21] Phong Q. Nguyen,et al. Distribution of Modular Sums and the Security of the Server Aided Exponentiation , 2001 .
[22] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[23] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[24] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[25] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.
[26] Jian Pei,et al. Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud , 2015, IEEE Transactions on Computers.
[27] Jinjun Chen,et al. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud , 2015, IEEE Transactions on Computers.
[28] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[29] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[30] Marc Girault,et al. Server-Aided Verification: Theory and Practice , 2005, ASIACRYPT.
[31] Peter de Rooij,et al. On Schnorr’s preprocessing for digital signature schemes , 1997, Journal of Cryptology.