Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
暂无分享,去创建一个
Jiankun Hu | Jixin Ma | Jing Qin | Binrui Zhu | Jiameng Sun | Jiankun Hu | Jixin Ma | Jiameng Sun | Jing Qin | Binrui Zhu
[1] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[2] Dan Boneh,et al. A Secure Signature Scheme from Bilinear Maps , 2003, CT-RSA.
[3] Yuan Zhou,et al. Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations , 2016, ACISP.
[4] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.
[5] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[6] Cong Wang,et al. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.
[7] Refik Molva,et al. Efficient Techniques for Publicly Verifiable Delegation of Computation , 2016, AsiaCCS.
[8] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[9] Jason Crampton,et al. Publicly Verifiable Outsourced Computation with a Key Distribution Centre , 2014, ArXiv.
[10] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[11] Jason Crampton,et al. Hybrid Publicly Verifiable Computation , 2016, CT-RSA.
[12] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[13] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[14] Rosario Gennaro,et al. Efficiently Verifiable Computation on Encrypted Data , 2014, CCS.
[15] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[16] Haiyan Zhang,et al. Verifiable Delegation of Polynomials , 2016, Int. J. Netw. Secur..
[17] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[18] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.
[19] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[20] Jason Crampton,et al. Revocation in Publicly Verifiable Outsourced Computation , 2014, Inscrypt.
[21] Robert H. Deng,et al. Verifiable Computation on Outsourced Encrypted Data , 2014, ESORICS.
[22] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[23] Reihaneh Safavi-Naini,et al. Batch verifiable computation of outsourced functions , 2015, Des. Codes Cryptogr..
[24] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[25] Elaine Shi,et al. Signatures of Correct Computation , 2013, TCC.
[26] Rafail Ostrovsky,et al. Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing , 2014, Public Key Cryptography.
[27] Jiankun Hu,et al. Confidentiality-Preserving Publicly Verifiable Computation , 2017, Int. J. Found. Comput. Sci..