Secure outsourcing of modular exponentiations in cloud and cluster computing
暂无分享,去创建一个
[1] Martín Abadi,et al. On hiding information from an oracle , 1987, STOC '87.
[2] Martín Abadi,et al. On Hiding Information from an Oracle , 1987, Proceeding Structure in Complexity Theory.
[3] Manuel Blum,et al. Program Result Checking against Adaptive Programs and in Cryptographic Settings , 1989, Distributed Computing And Cryptography.
[4] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[5] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[6] Phong Q. Nguyen,et al. Distribution of Modular Sums and the Security of the Server Aided Exponentiation , 2001 .
[7] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[8] Kwangjo Kim. Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings , 2001 .
[9] Markus Jakobsson,et al. Secure Server-Aided Signature Generation , 2001, Public Key Cryptography.
[10] Marc Girault,et al. Server-Aided Verification: Theory and Practice , 2005, ASIACRYPT.
[11] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[12] G. Edward Suh,et al. Speeding up Exponentiation using an Untrusted Computational Resource , 2006, Des. Codes Cryptogr..
[13] Joan Feigenbaum,et al. Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.
[14] Peter de Rooij,et al. On Schnorr’s preprocessing for digital signature schemes , 1997, Journal of Cryptology.
[15] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[16] Yi Mu,et al. Server-Aided Verification Signatures: Definitions and New Constructions , 2008, ProvSec.
[17] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[18] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[19] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[20] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[21] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[22] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[23] Jonathan Katz,et al. Multi-Client Non-interactive Verifiable Computation , 2013, TCC.
[24] Qiang Tang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[25] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[26] Lan Chen,et al. Semantic Link Network-Based Model for Organizing Multimedia Big Data , 2014, IEEE Transactions on Emerging Topics in Computing.
[27] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.
[28] Zhen Liu,et al. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage , 2014, ESORICS.
[29] Jin Li,et al. Privacy-preserving data utilization in hybrid clouds , 2014, Future Gener. Comput. Syst..
[30] Jin Li,et al. Digital provenance: Enabling secure data forensics in cloud computing , 2014, Future Gener. Comput. Syst..
[31] Haiyan Zhang,et al. Verifiable Delegation of Polynomials , 2016, Int. J. Netw. Secur..