Obfuscation for multi‐use re‐encryption and its application in cloud computing
暂无分享,去创建一个
[1] Nir Bitansky,et al. On Strong Simulation and Composable Point Obfuscation , 2010, Journal of Cryptology.
[2] Yuval Ishai,et al. Founding Cryptography on Tamper-Proof Hardware Tokens , 2010, IACR Cryptol. ePrint Arch..
[3] Sabela Ramos,et al. General‐purpose computation on GPUs for high performance cloud computing , 2013, Concurr. Comput. Pract. Exp..
[4] Ryo Nishimaki,et al. Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES , 2013, Des. Codes Cryptogr..
[5] W. Erik Anderson,et al. On the Secure Obfuscation of Deterministic Finite Automata , 2008, IACR Cryptol. ePrint Arch..
[6] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[7] Guy N. Rothblum,et al. On Best-Possible Obfuscation , 2007, Journal of Cryptology.
[8] Andreas Polze,et al. Trends and challenges in operating systems—from parallel computing to cloud computing , 2012, Concurr. Comput. Pract. Exp..
[9] Jean-Sébastien Coron,et al. Practical Multilinear Maps over the Integers , 2013, CRYPTO.
[10] Ran Canetti,et al. Obfuscating Point Functions with Multibit Output , 2008, EUROCRYPT.
[11] Ran Canetti,et al. Obfuscation of Hyperplane Membership , 2010, TCC.
[12] Ran Canetti,et al. Non-malleable Obfuscation , 2009, TCC.
[13] Amit Sahai,et al. Positive Results and Techniques for Obfuscation , 2004, EUROCRYPT.
[14] Dennis Hofheinz,et al. Obfuscation for Cryptographic Purposes , 2007, Journal of Cryptology.
[15] Hai Jin,et al. Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing , 2010, Concurr. Comput. Pract. Exp..
[16] Yael Tauman Kalai,et al. On Symmetric Encryption and Point Obfuscation , 2010, TCC.
[17] Hai Jin,et al. Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing , 2010 .
[18] Nico Döttling,et al. Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions , 2011, IACR Cryptol. ePrint Arch..
[19] WuJie,et al. Achieving fine-grained access control for secure data sharing on cloud servers , 2011 .
[20] Jin Li,et al. Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.
[21] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[22] Abhi Shelat,et al. Securely Obfuscating Re-Encryption , 2007, Journal of Cryptology.
[23] Hoeteck Wee,et al. On obfuscating point functions , 2005, STOC '05.
[24] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[25] Xuyun Zhang,et al. SaC‐FRAPP: a scalable and cost‐effective framework for privacy preservation over big data on cloud , 2013, Concurr. Comput. Pract. Exp..
[26] Hui Li,et al. A fine‐grained access control and revocation scheme on clouds , 2016, Concurr. Comput. Pract. Exp..
[27] Satoshi Hada,et al. Secure Obfuscation for Encrypted Signatures , 2010, EUROCRYPT.
[28] Jin Li,et al. Enabling efficient and secure data sharing in cloud computing , 2014, Concurr. Comput. Pract. Exp..
[29] Ran Canetti,et al. Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.
[30] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.
[31] Jie Wu,et al. Achieving fine‐grained access control for secure data sharing on cloud servers , 2011, Concurr. Comput. Pract. Exp..