An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys
暂无分享,去创建一个
Ximeng Liu | Jian Weng | Kim-Kwang Raymond Choo | Robert H. Deng | Ximeng Liu | R. Deng | K. Choo | J. Weng | R. Deng
[1] Changyu Dong,et al. When private set intersection meets big data: an efficient and scalable protocol , 2013, CCS.
[2] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[3] Carl Eklund,et al. National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.
[4] Craig Gentry,et al. Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[5] Dario Fiore,et al. Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data , 2015, CCS.
[6] Eric A. Fischer,et al. Overview and Issues for Implementation of the Federal Cloud Computing Initiative: Implications for Federal Information Technology Reform Management , 2013 .
[7] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[8] Artak Amirbekyan,et al. A New Efficient Privacy-Preserving Scalar Product Protocol , 2007, AusDM.
[9] Robert H. Deng,et al. An Efficient Privacy-Preserving Outsourced Computation over Public Data , 2017, IEEE Transactions on Services Computing.
[10] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Donald E. Knuth,et al. The Art of Computer Programming, Vol. 2 , 1981 .
[13] David Pointcheval,et al. Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks , 2001, ASIACRYPT.
[14] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[15] Wei Jiang,et al. An efficient and probabilistic secure bit-decomposition , 2013, ASIA CCS '13.
[16] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[17] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[18] Vivek Kundra,et al. Federal Cloud Computing Strategy , 2011 .
[19] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[20] Jack Dongarra,et al. PVM: Parallel virtual machine: a users' guide and tutorial for networked parallel computing , 1995 .
[21] Vaidy S. Sunderam,et al. PVM: A Framework for Parallel Distributed Computing , 1990, Concurr. Pract. Exp..
[22] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[23] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[24] Technologie. NIST Special Publication 800-53 , 2010 .
[25] Florian Kerschbaum,et al. Outsourced private set intersection using homomorphic encryption , 2012, ASIACCS '12.
[26] William J. Dally,et al. The GPU Computing Era , 2010, IEEE Micro.
[27] Michael Clear,et al. Multi-identity and Multi-key Leveled FHE from Learning with Errors , 2015, CRYPTO.
[28] Daniel Wichs,et al. Two Round MPC from LWE via Multi-Key FHE , 2015, IACR Cryptol. ePrint Arch..
[29] Jianfeng Ma,et al. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.
[30] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[31] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[32] R. Bohn. US Government Cloud Computing Technology Roadmap Volume I: High-Priority Requirements to Further USG Agency Cloud Computing Adoption; and Volume II: Useful Information for Cloud Adopters , 2014 .
[33] Durgesh Kumar Mishra,et al. Privacy Preserving k Secure Sum Protocol , 2009, ArXiv.
[34] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[35] Stefan Katzenbeisser,et al. Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.
[36] Jianfeng Ma,et al. Efficient and privacy-preserving skyline computation framework across domains , 2016, Future Gener. Comput. Syst..
[37] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[38] John D. Owens,et al. GPU Computing , 2008, Proceedings of the IEEE.
[39] Liam Morris,et al. Analysis of Partially and Fully Homomorphic Encryption , 2013 .
[40] Robert H. Deng,et al. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.
[41] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[42] Wen-Guey Tzeng,et al. An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption , 2005, ACNS.
[43] A. Salomaa,et al. Chinese remainder theorem: applications in computing, coding, cryptography , 1996 .
[44] Henk C. A. van Tilborg. Chinese Remainder Theorem , 2005, Encyclopedia of Cryptography and Security.
[45] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[46] Lance J. Hoffman,et al. Trust beyond security: an expanded trust model , 2006, CACM.
[47] Daniel Wichs,et al. Two Round Multiparty Computation via Multi-key FHE , 2016, EUROCRYPT.
[48] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[49] Kim-Kwang Raymond Choo,et al. A Forensically Sound Adversary Model for Mobile Devices , 2015, PloS one.
[50] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[51] Adi Shamir,et al. How to share a secret , 1979, CACM.
[52] Jameela Al-Jaroodi,et al. e-Health Cloud: Opportunities and Challenges , 2012, Future Internet.
[53] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[54] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[55] Durgesh Kumar Mishra,et al. A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations , 2010, ArXiv.
[56] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[57] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[58] Kim-Kwang Raymond Choo,et al. Cloud Storage Forensics , 2013, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.
[59] Prashant Pandey,et al. Cloud computing , 2010, ICWET.