A New Algorithm for Secure Outsourcing Composite Modular Exponentiation
暂无分享,去创建一个
[1] G. Edward Suh,et al. Speeding up Exponentiation using an Untrusted Computational Resource , 2006, Des. Codes Cryptogr..
[2] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[3] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.
[4] Ramarathnam Venkatesan,et al. Speeding up Discrete Log and Factoring Based Schemes via Precomputations , 1998, EUROCRYPT.
[5] Peter de Rooij. On Schnorr's Preprocessing for Digital Signature Schemes , 1993, EUROCRYPT.
[6] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[7] Peter de Rooij,et al. On Schnorr’s preprocessing for digital signature schemes , 1997, Journal of Cryptology.
[8] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[9] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[10] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.