Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions
暂无分享,去创建一个
[1] Mikhail J. Atallah,et al. Secure and Efficient Outsourcing of Sequence Comparisons , 2012, ESORICS.
[2] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[3] Manuel Blum,et al. Program Result Checking against Adaptive Programs and in Cryptographic Settings , 1989, Distributed Computing And Cryptography.
[4] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[5] Silvio Micali,et al. CS proofs , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[6] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[7] Divyakant Agrawal,et al. Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[8] Elaine Shi,et al. Streaming Authenticated Data Structures , 2013, EUROCRYPT.
[9] Roberto Tamassia,et al. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures , 2007, ICICS.
[10] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[11] Yael Tauman Kalai,et al. Delegating computation: interactive proofs for muggles , 2008, STOC.
[12] Dominique Schröder,et al. Verifiable data streaming , 2012, CCS.
[13] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[14] Reihaneh Safavi-Naini,et al. Verifiable Delegation of Computations with Storage-Verification Trade-off , 2014, ESORICS.
[15] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[16] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[17] Wei Song,et al. Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources , 2017, IEEE Transactions on Information Forensics and Security.
[18] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[19] Jin Li,et al. Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.
[20] G. Griffin,et al. Caltech-256 Object Category Dataset , 2007 .
[21] Srinath T. V. Setty,et al. A Hybrid Architecture for Interactive Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[22] Robert H. Deng,et al. Authenticating Query Results in Data Publishing , 2005, ICICS.
[23] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[24] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[25] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[26] Jonathan Katz,et al. IntegriDB: Verifiable SQL for Outsourced Databases , 2015, CCS.
[27] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[28] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[29] Jianfeng Ma,et al. Publicly verifiable databases with efficient insertion/deletion operations , 2017, J. Comput. Syst. Sci..
[30] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[31] Francisco Rodríguez-Henríquez,et al. Computing Discrete Logarithms in F36*137 using Magma , 2014, IACR Cryptol. ePrint Arch..
[32] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[33] Michael Szydlo,et al. Merkle Tree Traversal in Log Space and Time , 2004, EUROCRYPT.
[34] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.
[35] Ran Canetti,et al. Practical delegation of computation using multiple servers , 2011, CCS '11.
[36] Xiaofeng Meng,et al. Providing freshness guarantees for outsourced databases , 2008, EDBT '08.
[37] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[38] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[39] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[40] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[41] Dario Fiore,et al. Vector Commitments and Their Applications , 2013, Public Key Cryptography.
[42] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[43] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[44] Jianfeng Ma,et al. New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.
[45] Mikhail J. Atallah,et al. Secure outsourcing of sequence comparisons , 2004, International Journal of Information Security.
[46] Qian Wang,et al. Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.
[47] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[48] Ilsun You,et al. Verifiable Auditing for Outsourced Database in Cloud Computing , 2015, IEEE Transactions on Computers.
[49] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[50] Bogdan Carbunar,et al. Fair Payments for Outsourced Computations , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).