Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server
暂无分享,去创建一个
[1] Yi Mu,et al. Server-Aided Verification Signatures: Definitions and New Constructions , 2008, ProvSec.
[2] Duncan S. Wong,et al. Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] G. Edward Suh,et al. Speeding up Exponentiation using an Untrusted Computational Resource , 2006, Des. Codes Cryptogr..
[4] Jin Li,et al. Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[5] Ramarathnam Venkatesan,et al. Speeding up Discrete Log and Factoring Based Schemes via Precomputations , 1998, EUROCRYPT.
[6] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[7] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[8] Zhen Liu,et al. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage , 2014, ESORICS.
[9] Marc Girault,et al. Server-Aided Verification: Theory and Practice , 2005, ASIACRYPT.
[10] Xinpeng Zhang,et al. Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability , 2016, AsiaCCS.
[11] Jianfeng Wang,et al. Secure Outsourcing of Modular Exponentiation with Single Untrusted Server , 2015, 2015 18th International Conference on Network-Based Information Systems.
[12] Osmanbey Uzunkol,et al. Efficient and verifiable algorithms for secure outsourcing of cryptographic computations , 2015, International Journal of Information Security.
[13] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[14] Lakshmi Kuppusamy,et al. CRT-Based Outsourcing Algorithms for Modular Exponentiations , 2016, INDOCRYPT.
[15] Jianfeng Ma,et al. An Improved Algorithm for Secure Outsourcing of Modular Exponentiations , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[16] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[17] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.
[18] Peter Shiu,et al. Cryptography: Theory and practice (3rd edn), by Douglas R. Stinson. Pp. 593. 2006. (hbk) £39.99. ISBN 1 58488 508 4 (Chapman and Hall / CRC). , 2007, The Mathematical Gazette.
[19] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.
[20] Yanli Ren,et al. Verifiable Outsourcing Computation of Modular Exponentiations with Single Server , 2017, Int. J. Netw. Secur..
[21] Hideki Imai,et al. Speeding Up Secret Computations with Insecure Auxiliary Devices , 1988, CRYPTO.
[22] Jianfeng Ma,et al. Efficient algorithms for secure outsourcing of bilinear pairings , 2015, Theor. Comput. Sci..
[23] Zhenxing Qian,et al. How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing , 2020, IEEE Transactions on Cloud Computing.
[24] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[25] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[26] Phong Q. Nguyen,et al. Distribution of Modular Sums and the Security of the Server Aided Exponentiation , 2001 .