VeraGreg: A Framework for Verifiable Privacy-Preserving Data Aggregation
暂无分享,去创建一个
[1] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[2] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[3] Robert H. Deng,et al. Privacy-Preserving Outsourced Calculation Toolkit in the Cloud , 2020, IEEE Transactions on Dependable and Secure Computing.
[4] Brent Waters,et al. Targeted malleability: homomorphic encryption for restricted computations , 2012, ITCS '12.
[5] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[6] Stefan Katzenbeisser,et al. Group homomorphic encryption: characterizations, impossibility results, and applications , 2013, Des. Codes Cryptogr..
[7] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[8] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[9] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[10] Chunming Tang,et al. Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions , 2014, IACR Cryptol. ePrint Arch..
[11] Manoj Prabhakaran,et al. Homomorphic Encryption with CCA Security , 2008, ICALP.
[12] Joan Daemen. Advanced Encryption Standard , 2011, Encyclopedia of Cryptography and Security.