暂无分享,去创建一个
We show that the verifying equations in the scheme [Theoretical Computer Science, 562 (2015), 112-121] cannot filter out some malformed values returned by the malicious servers. We also remark that the two untrusted programs model adopted in the scheme is somewhat artificial, and discuss some reasonable scenarios for outsourcing computations.
[1] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[2] Jianfeng Ma,et al. Efficient algorithms for secure outsourcing of bilinear pairings , 2015, Theor. Comput. Sci..
[3] Marc Girault,et al. Server-Aided Verification: Theory and Practice , 2005, ASIACRYPT.
[4] David Naccache,et al. Secure Delegation of Elliptic-Curve Pairing , 2010, IACR Cryptol. ePrint Arch..