Verifiable algorithm for outsourced database with updating
暂无分享,去创建一个
Hui Li | Chunjie Cao | Zhengxi Wei | Zhen Guo
[1] Joan Feigenbaum,et al. Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.
[2] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[3] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[4] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[5] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[6] Kim-Kwang Raymond Choo,et al. Secure outsourcing of modular exponentiations under single untrusted programme model , 2017, J. Comput. Syst. Sci..
[7] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[8] Haiyan Zhang,et al. Verifiable Delegation of Polynomials , 2016, Int. J. Netw. Secur..
[9] Zhao Wang,et al. Secure Outsourcing Algorithm of Polynomials in Cloud Computing , 2016, SEKE.
[10] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[11] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[12] Wei Gao,et al. Improvement and applications of secure outsourcing of scientific computations , 2015, J. Ambient Intell. Humaniz. Comput..
[13] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[14] Zheng Xu,et al. Secure outsourcing of modular exponentiations in cloud and cluster computing , 2016, Cluster Computing.
[15] Manuel Blum,et al. Designing programs that check their work , 1989, STOC '89.
[16] Dario Fiore,et al. Vector Commitments and Their Applications , 2013, Public Key Cryptography.
[17] Jun Ye,et al. Verifiable Outsourcing of High-degree Polynomials and its Application in Keyword Search* , 2018 .
[18] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[19] Robert H. Deng,et al. Authenticating Query Results in Data Publishing , 2005, ICICS.
[20] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[21] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .