Multi-client Outsourced Computation
暂无分享,去创建一个
Haixia Xu | Yuanyuan Ji | Peili Li | Haixia Xu | Yuanyuan Ji | Peili Li
[1] Ming Li,et al. Computing encrypted cloud data efficiently under multiple keys , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[2] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[3] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[4] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[5] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[6] Yudong Zhang,et al. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation , 2014, TheScientificWorldJournal.
[7] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[8] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[9] Claudio Orlandi,et al. A Framework for Outsourcing of Secure Computation , 2014, CCSW.
[10] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[11] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[12] Elaine Shi,et al. Multi-Client Verifiable Computation with Stronger Security Guarantees , 2015, TCC.
[13] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[14] Jonathan Katz,et al. Multi-Client Non-interactive Verifiable Computation , 2013, TCC.
[15] Stefan Katzenbeisser,et al. Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.
[16] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.